This Nasty Apple iMessage Bug Could Have Bricked Your iPhone

There are few things more inconvenient in the modern world than a bricked smartphone. A security researcher recently disclosed an iMessage bug that could brick a user’s iPhone. The bug was severe enough to require users to wipe and restore their device.

What caused the bothersome issue? Google Project Zero security researcher Natalie Silvanovich noted that a “malformed message” contained a text key, but not a string. She noted that another method would try to use the key as if it was a string without confirmation. This created “an exception as the selector does not exist in that class”.

apple imessage iphone

This exception caused Springboard, an application launcher for iPhones, to crash and the device to stop responding. The bug even persisted after a hard reset. Unfortunately, there was no easy way to resolve this bug. Users had to wipe their device with the 'Find my iPhone', put the device in recovery mode and update it through iTunes, or remove their SIM card and wipe the device. iOS 12.3 resolved the issue this past May and this flaw should no longer be an issue.

Google Project Zero’s mission is to find zero-day vulnerabilities and other security flaws that could potentially pose a serious security threat. They have discovered and helped to patch a wide variety of exploits. This past March, they exposed a severe macOS XNU kernel flaw. The kernel allowed copy-on-write (COW) behavior that could help attackers mutate an on-disk file without informing the virtual management subsystem.

iphone xr blue black and white

The Google Project Zero team supposedly reported the issue to Apple in November 2018. They then published their discovery once it became clear that Apple had done nothing after 90 days to fix the flaw. Shortly afterward, Apple agreed to work on a patch and incorporate it into future updates.

Project Zero most recently found a security vulnerability in the Mozilla Firefox browser. According to Mozilla “ a type confusion vulnerability can occur when manipulating JavaScript objects due to issues in Array.pop. This can allow for an exploitable crash.” This vulnerability could enable hackers to install malware on a user’s device by tricking users into visiting certain websites. Thankfully, Mozilla responded quickly and released a patch immediately.
Brittany Goetting

Brittany Goetting

Brittany first became interested in technology when her dad showed her how to play Diablo II. She is an early-American/Canadian history Ph.D. student and is concerned about incorporating technology into the humanities and digitizing historical resources. When not writing tech news or trying to save old documents from falling into pieces, you can most likely find her playing with her rescued Saint Bernard-mix, Freckles. 

Opinions and content posted by HotHardware contributors are their own.