iOS 10 Security Updates Move to HTTPS

Today’s release of iOS 10 also included patches for seven vulnerabilities and the news that security updates will now be delivered by HTTPS connections.

Update Apple has finally moved its iOS security update mechanism to HTTPS with today’s release of iOS 10.

Previously, updates were sent to devices over HTTP and attackers already present on a network could interfere with updates.

“An issue existed in iOS updates, which did not properly secure user communications. This issue was addressed by using HTTPS for software updates,” Apple said in its advisory, adding that a man-in-the-middle attacker could block devices from receiving updates.

The change was one of seven vulnerabilities patched in iOS 10, a major update for the mobile operating system. In the early hours of the update, users were also reporting issues with the installation that was putting devices in recovery mode, according to MacRumors. Apple later conceded there was an issue with the update process, and that a small number of users were affected before it was fixed.

Apple patched a potentially serious issue in the native iOS Mail application where an attacker on the network could steal email credentials.

“An issue existed when handling untrusted certificates,” Apple said. “This was addressed by terminating untrusted connections.”

Apple also patched a privacy issue in its new Messages framework for iOS 10 and earlier for iPhones and iPads where messages could be read on a device that is not signed in. Apple said the issue was in the use of Handoff for Messages, and was resolved through better state management. Handoff ensures syncing and continuity between iOS devices.

Apple also resolved an issue where malicious applications could be used to determine who a device owner is texting.

“An access control issue existed in SMS draft directories,” Apple said. “This issue was addressed by preventing apps from stat’ing the affected directories.”

Apple also patched a vulnerability in the iOS keyboard where the keyboard was caching sensitive information and revealing it in auto-correct suggestions.

A bug in GeoServices was also addressed that could allow apps to read location information because of a permissions issue in PlaceData.

Apple also updated Xcode for El Capitan 10.11.5 and later, patching a vulnerability in the otool utility that allows a local attacker to crash applications or run code. Apple said it patched multiple memory corruption flaws.

The final update was to watchOS where a permissions issue in PlaceData could allow an application to read location information.

 

This article was updated Sept. 14 to include Xcode and watchOS patch information. 

Suggested articles