POC详情: a070cb0f528032cb7aaab3efe37a0b56c639a798

来源
关联漏洞
标题: Apple iOS和Apple iPadOS 资源管理错误漏洞 (CVE-2025-24085)
描述:Apple iOS和Apple iPadOS都是美国苹果(Apple)公司的产品。Apple iOS是一套为移动设备所开发的操作系统。Apple iPadOS是一套用于iPad平板电脑的操作系统。 Apple iOS 18.3版本和Apple iPadOS 18.3版本存在资源管理错误漏洞,该漏洞源于恶意应用程序可能能够提升权限。
描述
Glass Cage is a zero-click PNG-based RCE chain in iOS 18.2.1, exploiting WebKit (CVE-2025-24201) and Core Media (CVE-2025-24085) to achieve sandbox escape, kernel-level access, and device bricking. Triggered via iMessage, it enables full compromise with no user interaction.
介绍
# Glass Cage: Zero-Click PNG Exploit Chain for iOS 18.2.1

**CVE-2025-24201** – WebKit Remote Code Execution  
**CVE-2025-24085** – Core Media Privilege Escalation

**Reported to Apple:** January 9, 2025  
**Patched:** February–March 2025  
**Tested On:** iPhone 14 Pro Max (iOS 18.2.1)  
**CVSS Base Score:** 9.8 (Critical)

---

## Summary

**Glass Cage** is a critical, zero-click PNG-based exploit chain discovered **in the wild** targeting iOS 18.2.1. The attack was actively observed on compromised devices and confirmed to be used against real-world targets prior to vendor patching.

A malicious PNG image sent via iMessage initiates the chain by triggering automatic parsing in `MessagesBlastDoorService`. The image exploits a WebKit heap corruption vulnerability (CVE-2025-24201), followed by a sandbox escape and a kernel-level privilege escalation in Core Media (CVE-2025-24085).

The chain ultimately provides attackers with root-level access, persistent control, keychain exfiltration, and even the ability to irreversibly brick devices via IORegistry manipulation. No user interaction is required.

---

## Exploit Chain

1. **Malicious PNG Creation**  
   - Embedded HEIF payloads with malformed EXIF fields  
   - Triggers heap corruption in `ATXEncoder`

2. **Silent Trigger via iMessage**  
   - File auto-processed by `MessagesBlastDoorService`  
   - RCE achieved through WebKit (CVE-2025-24201)

3. **Sandbox Escape**  
   - WebKit bypasses resource isolation to access private assets

4. **Privilege Escalation**  
   - Core Media flaw (CVE-2025-24085) enables kernel access  
   - Exploits `mediaplaybackd`, `codecctl`, and `IOHIDInterface`

5. **Persistence and Bricking**  
   - Injects rogue daemons via `launchd`  
   - Hijacks network through `wifid`  
   - Bricks device via IORegistry modification

---

## Indicators of Compromise

- WebKit resource lookups for internal assets  
- Rogue IP assignment: `172.16.101.176`  
- Modified proxy settings in `wifid`  
- Abnormal access to `CloudKeychainProxy`  
- IORegistry value: `IOAccessoryPowerSourceItemBrickLimit = 0`

---

## Timeline

| Date         | Event                                           |
|--------------|-------------------------------------------------|
| Jan 9, 2025  | Exploit chain observed in the wild              |
| Jan 9, 2025  | Initial report submitted to Apple               |
| Feb 20, 2025 | CVE-2025-24085 patched (Core Media)             |
| Mar 7, 2025  | CVE-2025-24201 patched (WebKit)                 |
| Mar 18, 2025 | CNVD-2025-06744 registered                      |
| Apr 22, 2025 | CNVD-2025-07885 registered                      |

---

## Disclosure

This exploit chain was discovered being used in the wild and responsibly disclosed to Apple. Patches have since been released. At the time of discovery, active exploitation was confirmed.

---

## CNVD Certification

This research has been independently verified and certified by the **China National Vulnerability Database (CNVD)**. These official certificates confirm the high-risk status of both vulnerabilities used in the Glass Cage exploit chain:

- **CNVD-2025-07885** – Use-After-Free in Apple Media Services  

- **CNVD-2025-06744** – Buffer Overflow in Apple iOS/iPadOS Core Media  
 
**Researcher:** Joseph Goydish  II
**Submission Type:** Personal Researcher Submission  
**Certification Authority:** CNCERT / CNVD  

---

## MITRE ATT&CK Mapping

| Tactic              | Technique                            |
|---------------------|--------------------------------------|
| Initial Access      | T1203 – Exploitation for Client Exec |
| Execution           | T1059 – Command and Scripting Interp |
| Persistence         | T1547 – Boot or Logon Autostart Exec |
| Privilege Escalation| T1068 – Exploitation for Priv Esc    |
| Defense Evasion     | T1140 – Deobfuscate/Decode Files     |
| Impact              | T1499 – Endpoint Denial of Service   |

---

## Legal Notice

This repository is provided for **research and educational purposes only**.  
The techniques described must **not** be used against systems without proper authorization.  
The author assumes **no liability** for misuse or damage resulting from the information contained herein.

---

## References

- CVE-2025-24085 – Core Media Privilege Escalation  
- CVE-2025-24201 – WebKit Remote Code Execution  
- CNVD-2025-06744 – iOS/iPadOS Buffer Overflow  
- CNVD-2025-07885 – Use-After-Free in Apple Media Services  

---
文件快照

[4.0K] /data/pocs/a070cb0f528032cb7aaab3efe37a0b56c639a798 ├── [684K] CNVD-YCGO-202503023656.pdf ├── [684K] CNVD-YCGO-202504012519.pdf ├── [7.1K] Glass Cage Report.md └── [4.4K] README.md 0 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。