Between the period of July 6th to October 6th myself, Brett Buerhaus, Ben Sadeghipour, Samuel Erb, and Tanner Barnes worked together and hacked on the Apple bug bounty program.
During our engagement, we found a variety of vulnerabilities in core portions of their infrastructure that would’ve allowed an attacker to fully compromise both customer and employee applications, launch a worm capable of automatically taking over a victim’s iCloud account, retrieve source code for internal Apple projects, fully compromise an industrial control warehouse software used by Apple, and take over the sessions of Apple employees with the capability of accessing management tools and sensitive resources.
There were a total of 55 vulnerabilities discovered with 11 critical severity, 29 high severity, 13 medium severity, and 2 low severity reports. These severities were assessed by us for summarization purposes and are dependent on a mix of CVSS and our understanding of the business related impact.
And most importantly:
As of October 6th, 2020, the vast majority of these findings have been fixed and credited. They were typically remediated within 1–2 business days (with some being fixed in as little as 4–6 hours).
It’s surprising that this story hasn’t been picked up by main stream news outlets? Anyway, this is a fascinating read with loads of detail and some insight into Apples bug bounty program.
We’re truly lucky that Sam and his crew were the good guys.