'
Breaking
May 3, 2025

This Week in Security: AirBorne, EvilNotify, and Revoked RDP Jonathan Bennett | usagoldmines.com

This week, Oligo has announced the AirBorne series of vulnerabilities in the Apple Airdrop protocol and SDK. This is a particularly serious set of issues, and notably affects MacOS desktops and laptops, the iOS and iPadOS mobile devices, and many IoT devices that use the Apple SDK to provide AirPlay support. It’s a group of 16 CVEs based on 23 total reported issues, with the ramifications ranging from an authentication bypass, to local file reads, all the way to Remote Code Execution (RCE).

AirPlay is a WiFi based peer-to-peer protocol, used to share or stream media between devices. It uses port 7000, and a custom protocol that has elements of both HTTP and RTSP. This scheme makes heavy use of property lists (“plists”) for transferring serialized information. And as we well know, serialization and data parsing interfaces are great places to look for vulnerabilities. Oligo provides an example, where a plist is expected to contain a dictionary object, but was actually constructed with a simple string. De-serializing that plist results in a malformed dictionary, and attempting to access it will crash the process.

Another demo is using AirPlay to achieve an arbitrary memory write against a MacOS device. Because it’s such a powerful primative, this can be used for zero-click exploitation, though the actual demo uses the music app, and launches with a user click. Prior to the patch, this affected any MacOS device with AirPlay enabled, and set to either “Anyone on the same network” or “Everyone”. Because of the zero-click nature, this could be made into a wormable exploit.

Apple has released updates for their products for all of the CVEs, but what’s going to really take a long time to clean up is the IoT devices that were build with the vulnerable SDK. It’s likely that many of those devices will never receive updates.

EvilNotify

It’s apparently the week for Apple exploits, because here’s another one, this time from [Guilherme Rambo]. Apple has built multiple systems for doing Inter Process Communications (IPC), but the simplest is the Darwin Notification API. It’s part of the shared code that runs on all of Apple’s OSs, and this IPC has some quirks. Namely, there’s no verification system, and no restrictions on which processes can send or receive messages.

That led our researcher to ask what you may be asking: does this lack of authentication allow for any security violations? Among many novel notifications this technique can spoof, there’s one that’s particularly problematic: The device “restore in progress”. This locks the device, leaving only a reboot option. Annoying, but not a permanent problem.

The really nasty version of this trick is to put the code triggering a “restore in progress” message inside an app’s widget extension. iOS loads those automatically at boot, making for an infuriating bootloop. [Guilherme] reported the problem to Apple, made a very nice $17,500 in the progress. The fix from Apple is a welcome surprise, in that they added an authorization mechanism for sensitive notification endpoints. It’s very likely that there are other ways that this technique could have been abused, so the more comprehensive fix was the way to go.

Jenkins

Continuous Integration is one of the most powerful tools a software project can use to stay on top of code quality. Unfortunately as those CI toolchains get more complicated, they are more likely to be vulnerable, as [John Stawinski] from Praetorian has discovered. This attack chain would target the Node.js repository at Github via an outside pull request, and ends with code execution on the Jenkins host machines.

The trick to pulling this off is to spoof the timestamp on a Pull Request. The Node.js CI uses PR labels to control what CI will do with the incoming request. Tooling automatically adds the “needs-ci” label depending on what files are modified. A maintainer reviews the PR, and approves the CI run. A Jenkins runner will pick up the job, compare that the Git timestamp predated the maintainer’s approval, and then runs the CI job. Git timestamps are trivial to spoof, so it’s possible to load an additional commit to the target PR with a commit timestamp in the past. The runner doesn’t catch the deception, and runs the now-malicious code.

[John] reported the findings, and Node.js maintainers jumped into action right away. The primary fix was to do SHA sum comparisons to validate Jenkins runs, rather than just relying on timestamp. Out of an abundance of caution, the Jenkins runners were re-imaged, and then [John] was invited to try to recreate the exploit. The Node.js blog post has some additional thoughts on this exploit, like pointing out that it’s a Time-of-Check-Time-of-Use (TOCTOU) exploit. We don’t normally think of TOCTOU bugs where a human is the “check” part of the equation.

2024 in 0-days

Google has published an overview of the 75 zero-day vulnerabilities that were exploited in 2024. That’s down from the 98 vulnerabilities exploited in 2023, but the Threat Intelligence Group behind this report are of the opinion that we’re still on an upward trend for zero-day exploitation. Some platforms like mobile and web browsers have seen drastic improvements in zero-day prevention, while enterprise targets are on the rise. The real stand-out is the targeting of security appliances and other network devices, at more than 60% of the vulnerabilities tracked.

When it comes to the attackers behind exploitation, it’s a mix between state-sponsored attacks, legal commercial surveillance, and financially motivated attacks. It will be interesting to see how 2025 stacks up in comparison. But one thing is for certain: Zero-days aren’t going away any time soon.

Perplexing Passwords for RDP

The world of computer security just got an interesting surprise, as Microsoft declared it not-a-bug that Windows machines will continue to accept revoked credentials for Remote Desktop Protocol (RDP) logins. [Daniel Wade] discovered the issue and reported it to Microsoft, and then after being told it wasn’t a security vulnerability, shared his report with Ars Technica.

So what exactly is happening here? It’s the case of a Windows machine login via Azure or a Microsoft account. That account is used to enable RDP, and the machine caches the username and password so logins work even when the computer is “offline”. The problem really comes in how those cached passwords get evicted from the cache. When it comes to RDP logins, it seems they are simply never removed.

There is a stark disconnect between what [Wade] has observed, and what Microsoft has to say about it. It’s long been known that Windows machines will cache passwords, but that cache will get updated the next time the machine logs in to the domain controller. This is what Microsoft’s responses seem to be referencing. The actual report is that in the case of RDP, the cached passwords will never expire, regardless of changing that password in the cloud and logging on to the machine repeatedly.

Bits and Bytes

Samsung makes a digital signage line, powered by the MagicINFO server application. That server has an unauthenticated endpoint, accepting file uploads with insufficient filename sanitization. That combination leads to arbitrary pre-auth code execution. While that’s not great, what makes this a real problem is that the report was first sent to Samsung in January, no response was ever received, and it seems that no fixes have officially been published.

A series of Viasat modems have a buffer overflow in their SNORE web interface. This leads to unauthenticated, arbitrary code execution on the system, from either the LAN or OTA interface, but thankfully not from the public Internet itself. This one is interesting in that it was found via static code analysis.

IPv6 is the answer to all of our IPv4 induced woes, right? It has Stateless Address Autoconfiguration (SLAAC) to handle IP addressing without DHCP, and Router Advertisement (RA) to discover how to route packets. And now, taking advantage of that great functionality is Spellbinder, a malicious tool to pull off SLACC attacks and do DNS poisoning. It’s not entirely new, as we’ve seen Man in the Middle attacks on IPv4 networks for years. IPv6 just makes it so much easier.

 

This articles is written by : Nermeen Nabil Khear Abdelmalak

All rights reserved to : USAGOLDMIES . www.usagoldmines.com

You can Enjoy surfing our website categories and read more content in many fields you may like .

Why USAGoldMines ?

USAGoldMines is a comprehensive website offering the latest in financial, crypto, and technical news. With specialized sections for each category, it provides readers with up-to-date market insights, investment trends, and technological advancements, making it a valuable resource for investors and enthusiasts in the fast-paced financial world.

Recent:

A Gentle Introduction to Impedance Matching Aaron Beckendorf | usagoldmines.com

Prusa Mini Nozzle Cam on the Cheap Heidi Ulrich | usagoldmines.com

Major Cybersecurity Breach Exposes Records of 4,000,000,000 Americans – Including Names, Addresses a...

Smart Speaker Gets Brain Surgery, Line-Out Tyler August | usagoldmines.com

3D Printed Spirograph Makes Art Out of Walnut Tyler August | usagoldmines.com

Supercon 2024: Turning Talk Into Action Lewin Day | usagoldmines.com

Preparing for the Next Pandemic Navarre Bartz | usagoldmines.com

Hackaday Podcast Episode 319: Experimental Archaeology, Demoscene Oscilloscope Music, and Electronic...

Is This the Truck We’ve Been Waiting For? Tyler August | usagoldmines.com

Pinoutleaf: Simplifying Pinout References Matt Varian | usagoldmines.com

Single-Board Z80 Computer Draws Inspiration From Picasso Lewin Day | usagoldmines.com

Blurry Image Placeholders, Generated With Minimal CSS Donald Papp | usagoldmines.com

Printable Pegboard PC Shows Off the RGB Tyler August | usagoldmines.com

Crypto Wallet Company Ledger Issues Warning as Customers Receive Physical Scam Letters Rhodilee Jean...

Make Your Own Telescope, Right Down To The Glass Lewin Day | usagoldmines.com

libogc Allegations Rock Wii Homebrew Community Tom Nardi | usagoldmines.com

Open Source Firmware For The JYE TECH DSO-150 Lewin Day | usagoldmines.com

Researchers Create A Brain Implant For Near-Real-Time Speech Synthesis Lewin Day | usagoldmines.com

A Dual Mirror System For Better Cycling Safety Donald Papp | usagoldmines.com

Gaze Upon Robby The Robot’s Mechanical Intricacy Donald Papp | usagoldmines.com

Vintage Stereo Stack Becomes Neat PC Case Lewin Day | usagoldmines.com

Neutron Flux Impact on Quartz Expansion Rate Maya Posch | usagoldmines.com

A New And Weird Kind of Typewriter Lewin Day | usagoldmines.com

FLOSS Weekly Episode 831: Let’s Have Lunch Jonathan Bennett | usagoldmines.com

Layout A PCB with Tscircuit Al Williams | usagoldmines.com

Supercon 2024: Photonics/Optical Stack for Smart-Glasses Lewin Day | usagoldmines.com

Radio Repeaters In the Sky Bryan Cockfield | usagoldmines.com

A Gentle Introduction to COBOL Maya Posch | usagoldmines.com

Terminal DAW Does it in Style Fenix Guthrie | usagoldmines.com

Building an nRF52840 and Battery-Powered Zigbee Gate Sensor Maya Posch | usagoldmines.com

Back to Reality with the Time Brick Bryan Cockfield | usagoldmines.com

Comparing ‘AI’ for Basic Plant Care With Human Brown Thumbs Maya Posch | usagoldmines.com

Read Motor Speed Better By Making The RP2040 PIO Do It Donald Papp | usagoldmines.com

Crossing Commodore Signal Cables on Purpose Bryan Cockfield | usagoldmines.com

There’s An Venusian Spacecraft Coming Our Way Jenny List | usagoldmines.com

The DIY 1982 Picture Phone Al Williams | usagoldmines.com

Peeking at Poking Health Tech: the G7 and the Libre 3 Heidi Ulrich | usagoldmines.com

Keebin’ with Kristina: the One with the Protractor Keyboard Kristina Panos | usagoldmines.com

Hydrogen Trains: Not The Success Germany Hoped They Would Be Jenny List | usagoldmines.com

Weird And Wonderful VR/MR Text Entry Methods, All In One Place Donald Papp | usagoldmines.com

Pi Pico Throws Us for a (MIDI) Loop Tyler August | usagoldmines.com

Deriving the Reactance Formulas Al Williams | usagoldmines.com

EclairM0, the pocket notepad Matt Varian | usagoldmines.com

Tinycorder Isn’t Quite a Tricorder, But… Al Williams | usagoldmines.com

Paint Mixing Theory for Custom Filament Colors Aaron Beckendorf | usagoldmines.com

Supercon 2024: Sketching With Machines Lewin Day | usagoldmines.com

X-Rays From an Overdriven Magnetron Dan Maloney | usagoldmines.com

Life on K2-18b? Don’t Get Your Hopes Up Just Yet Tom Nardi | usagoldmines.com

ASUS GPU Uses Gyroscope to Warn for Sagging Cards Maya Posch | usagoldmines.com

Look! It’s a Knob! It’s a Jack! It’s Euroknob! Dan Maloney | usagoldmines.com

Kaleidoscopico Shows Off Pi Pico’s Capabilities Bryan Cockfield | usagoldmines.com

Design Constraints Bring Lockbox to Life Bryan Cockfield | usagoldmines.com

Hackaday Links: April 27, 2025 Dan Maloney | usagoldmines.com

How Methane Took Over the Booster World Tyler August | usagoldmines.com

Hackers Create Fake Corporate Entities in the US To Fool Crypto Developers and Spread Malware: Repor...

Quick and Easy Digital Stethoscope Keeps Tabs on Cat Dan Maloney | usagoldmines.com

VESC Mods Made Via Vibe Coding Lewin Day | usagoldmines.com

Save Cells from the Landfill, Get a Power Bank For Your Troubles Donald Papp | usagoldmines.com

Deep Dive on Panel Making Al Williams | usagoldmines.com

Creating An Electronic Board For Catan-Compatible Shenanigans Lewin Day | usagoldmines.com

Another Coil Winder Project Al Williams | usagoldmines.com

YKK’s Self-Propelled Zipper: Less Crazy Than It Seems Maya Posch | usagoldmines.com

Remembering Heathkit Al Williams | usagoldmines.com

88,848 Americans Exposed As Massive Medical Data Breach Leaks Names, Addresses, Social Security Numb...

Wells Fargo Customer Loses $8,265 As Thieves Laugh, $28,000 Drained From JPMorgan Chase Account in A...

Quantum Random Number Generator Squirts Out Numbers Via MQTT Lewin Day | usagoldmines.com

Wells Fargo To Pay $185,000,000 To Customers in Massive New Settlement – Here’s Who Will Benefit Ale...

From Good Enough to Best Elliot Williams | usagoldmines.com

Digital Squid’s Behavior Shaped by Neural Network Bryan Cockfield | usagoldmines.com

Amazing Oscilloscope Demo Scores The Win At Revision 2025 Lewin Day | usagoldmines.com

RP2040 Spins Right ‘Round inside POV Display Tyler August | usagoldmines.com

Hash Functions with the Golden Ratio Bryan Cockfield | usagoldmines.com

7,605 Bank Customers Receive Urgent Data Breach Alerts After ‘Administrative Error’ Exposes Social S...

XOR Gate as a Frequency Doubler Al Williams | usagoldmines.com

Retired NBA Star Shaquille O’Neal Settles FTX Endorsement Lawsuit for Undisclosed Amount Rhodilee Je...

Robot Gets a DIY Pneumatic Gripper Upgrade Lewin Day | usagoldmines.com

Hackaday Podcast Ep 318: DIY Record Lathe, 360 Degree LIDAR, and 3D Printing Innovation Lives! Jenny...

Sigrok Website Down After Hosting Data Loss Maya Posch | usagoldmines.com

You Wouldn’t Steal a Font… Jenny List | usagoldmines.com

This Week in Security: XRP Poisoned, MCP Bypassed, and More Jonathan Bennett | usagoldmines.com

Posthumous Composition Being Performed by the Composer Seth Mabbott | usagoldmines.com

Clickspring’s Experimental Archaeology: Concentric Thin-Walled Tubing Dan Maloney | usagoldmines.com

Adding an Atari Joystick Port to TheC64 USB Joystick Lewin Day | usagoldmines.com

LLMs Coming for a DNA Sequence Near You Navarre Bartz | usagoldmines.com

3D Printing A Useful Fixturing Tool Lewin Day | usagoldmines.com

Onkyo Receiver Saved With An ESP32 Lewin Day | usagoldmines.com

DolphinGemma Seeks to Speak to Dolphins Navarre Bartz | usagoldmines.com

A Bicycle is Abandonware Now? Clever Hack Rescues Dead Light Jenny List | usagoldmines.com

From PostScript to PDF Al Williams | usagoldmines.com

Haptic Soft Buttons Speak(er) to Your Sense of Touch Tyler August | usagoldmines.com

The Mohmmeter: A Steampunk Multimeter Matt Varian | usagoldmines.com

C64 Assembly in Parts Al Williams | usagoldmines.com

Improved and Open Source: Non-Planar Infill for FDM Heidi Ulrich | usagoldmines.com

Abusing DuckDB-WASM To Create Doom In SQL Maya Posch | usagoldmines.com

The Evertop: a Low-Power, Off-Grid Solar Gem Heidi Ulrich | usagoldmines.com

FLOSS Weekly Episode 830: Vibes Jonathan Bennett | usagoldmines.com

Open Source Commercial Synthesisers You Will Love Jenny List | usagoldmines.com

To See Within: Detecting X-Rays Dan Maloney | usagoldmines.com

Unsolved Questions in Astronomy? Try Dark Matter! Tyler August | usagoldmines.com

A Scratch-Built Commodore 64, Turing Style Dan Maloney | usagoldmines.com

Leave a Reply