A protection researcher declares adjustments Apple made to tighten its kernel safety system in iOS 7 as an alternative damaged the system, making it much less secure compared to its iOS 6 equivalent. (Via CNET and ThreatPost) Azimuth Safety analyst Tarjei Mandt uncovered the defect and introduced his seekings recently at CanSecWest.


The safety imperfection involves the random number generator Apple utilizes to protect its bit. In iOS 6, the number generator that secured the bit derived its worths in part from the CPU clock counter. Because it was based upon time, the file encryption was simply marginally safe as the outcome values were predictable, especially when checking out succeeding numbers.

Apple knew the restrictions in iOS 6 and tried to tighten up security in iOS 7 by changing the arbitrary number generator to a linear congruential generator, which is much more vulnerable to brute pressure attacks.

The problem with the new generator in iOS 7 is that it uses a linear recursion formula, Mandt said, which has “a lot more correlation” between the values it creates. That makes them much easier to extrapolate and think, he shared.

This flaw potentially permits a harmful hacker to get kernel-level access to an iOS gadget via an unpatched vulnerability. The bit is the base component of the iOS operating device and controls low-level features such as protection and source allotment.

Apple moved toward Mandt concerning his findings and asked for his CanSecWest slide discussion.

You can follow iPhoneFirmware.com on Twitter or join our Facebook page to keep yourself updated on all the latest from Apple and the Web.