Apple Apologizes to Researcher for Ignoring iOS Vulnerabilities, Says It’s ‘Still Investigating’

Last week, security researcher Denis Tokarev made several zero-day iOS vulnerabilities public after he said that Apple had ignored his reports and had failed to fix the issues for several months.

iPhone 13 Security
Tokarev today told Motherboard that Apple got in touch after he went public with his complaints and after they saw significant media attention. In an email, Apple apologized for the contact delay and said that it is “still investigating” the issues.

“We saw your blog post regarding this issue and your other reports. We apologize for the delay in responding to you,” an Apple employee wrote. “We want to let you know that we are still investigating these issues and how we can address them to protect customers. Thank you again for taking the time to report these issues to us, we appreciate your assistance. Please let us know if you have any questions.”

Apple did fix one of the vulnerabilities in iOS 14.7, but did not provide Tokarev with credit. Three others remain unaddressed, including a Game Center bug that allegedly allows any app installed from the App Store to access full Apple ID email and name, ‌Apple ID‌ authentication tokens, lists of contacts, and some attachments.

Details on all of the zero-day vulnerabilities have been published publicly by Tokarev, which may prompt Apple to fix them faster.

Tokarev first contacted Apple about these bugs between March 10 and May 4, so Apple has had months to issue patches, but it’s worth noting that several security researchers and Tokarev himself have confirmed that the bugs are not highly critical as exploiting them would require a malicious app to first receive ‌App Store‌ approval.

Still, experts have criticized Apple’s response and its bug bounty program. Cybersecurity expert Katie Moussouris told Motherboard that Apple’s handling of the process is “not normal and should not be considered normal,” while researcher Nicholas Ptacek said that Apple’s response comes across as a “reaction to bad press.”

Earlier this month, The Washington Post interviewed more than two dozen security researchers to expose the flaws in Apple’s bug bounty program. Researchers said that Apple is slow to fix bugs and doesn’t always pay out what’s owed, leading researchers to be unhappy with Apple’s program.

At the time, Apple’s Head of Security Engineering and Architecture, Ivan Krstić, said that Apple is “planning to introduce new rewards for researchers” to expand participation, and that Apple is working toward offering new and even better research tools.

Leave a Reply

Your email address will not be published. Required fields are marked *