‘Almost every Apple device’ vulnerable to CocoaPods supply chain attack

'Almost every Apple device' vulnerable to CocoaPods supply chain attack

July 2, 2024 at 03:39AM

CocoaPods, a widely used open-source dependency manager for Swift and Objective-C apps, was found to have left thousands of packages exposed to takeover for nearly a decade. Security researchers from EVA Information Security identified multiple vulnerabilities, including supply chain attack opportunities, and potential remote code execution. The CocoaPods team has reportedly patched these issues.

Based on the meeting notes provided, it seems that there are several vulnerabilities in CocoaPods that were discovered by EVA Information Security. These vulnerabilities include unclaimed or orphaned Pods which could be exploited to insert malicious code, a vulnerability allowing remote code execution on the Trunk server, and a vulnerability in the Trunk server’s own source code. Additionally, there is a zero-click takeover vulnerability, which could potentially impact the entire Apple ecosystem. It is noted that CocoaPods maintainers have patched the issues, though specifics weren’t widely known until EVA published its research. The researchers recommend everyone using CocoaPods to review their dependencies for orphaned Pods, perform checksum validations on all code downloaded from the CocoaPods Trunk server, review all third-party code, update their CocoaPods installations, and generally be more attentive to open source software supply chain risks. It is also mentioned that there is no direct evidence of these vulnerabilities being exploited in the wild, but absence of evidence is not evidence of absence.

In conclusion, it is important for organizations using CocoaPods or any open source components to be vigilant in reviewing their dependencies, performing regular security checks, and staying updated with patches and security measures to mitigate the risks associated with third-party dependencies.

If there is any specific action required or if there are additional questions, please let me know.

Full Article