Home > Cyber News > CVE-2021-30860: Fix Your Apple Device against the FORCEDENTRY Zero-Day

CVE-2021-30860: Fix Your Apple Device against the FORCEDENTRY Zero-Day

CVE-2021-30860  FORCEDENTRY zero-day in Apple devices

There’s a new zero-day, zero-click vulnerability in all types of Apple devices, including Macs, iPhones, iPads, and WatchOS. The flaw has been called FORCEDENTRY.

Related: The State of Apple’s Privacy So Far in 2021

How was the Apple FORCEDENTRY (CVE-2021-30860) zero-day disclosed, and who discovered it?

The zero-day was discovered by Citizen Lab researchers during an analysis of the phone of a Saudi activist infected with the Pegasus spyware. The flaw is a zero-click exploit against iMessage, targeting Apple’s image-rendering library.

The researchers were able to determine “that the mercenary spyware company NSO Group used the vulnerability to remotely exploit and infect the latest Apple devices with the Pegasus spyware.” It is believed that FORCEDENTRY has been in use since at least February 2021.

The NSO Group is the maker of Pegasus, an advanced spyware application that jailbreaks or roots infected devices enabling the spyware to go through private messages, activate the microphone and camera, and collect sensitive information.

Citizen Lab disclosed their findings, including the code, to Apple. Following the official disclosure, the vulnerability was assigned the CVE-2021-30860 identifier. According to its official description, it’s an issue that could lead to processing a maliciously crafted PDF and arbitrary code execution.

So far, only limited technical details are made available. What is known so far is that the FORCEDENTRY exploit works by leveraging an integer overflow vulnerability in Apple’s image rendering library (CoreGraphics).

Fortunately, an update is now available for CVE-2021-30860. Apple users are urged to update their devices immediately. To fix the issue, an integer overflow was addressed with improved input validation, the advisory revealed.

Not the first NSO Group zero-day zero-click flaw

It is noteworthy that another zero-click vulnerability was attributed to the NSO Group in 2019.

The flaw allowed hackers to compromise devices using the Pegasus spyware. The CVE-2019-3568 vulnerability was a buffer overflow in WhatsApp VOIP stack. It allowed remote code execution via specially crafted series of SRTCP packets sent to a target phone number.

It is worth mentioning that exploits based on the flaw happened by calling either a vulnerable iPhone or an Android device via the WhatsApp calling function. Furthermore, the calls didn’t need to be answered, and often disappeared from logs. Fortunately, the flaw was supposedly fixed.

Milena Dimitrova

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

More Posts

Follow Me:

1 Comment
  1. Deb

    So how do we get this off our phones????


Leave a Comment

Your email address will not be published. Required fields are marked *

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree