Duo Security uncovers vulnerabilities in Apple's managed device program
The problem has surfaced because Apple only requires device serial numbers to verify users
Duo Security has uncovered a major vulnerability in Apple's Device Enrollment Programme that could affect devices automatically provisioned for business use.
The problem lies in the authentication of devices, potentially allowing hackers to enrol any device in an organisation's MDM (mobile device management) server, gaining access to privileged information. The access is granted because not all organisations have user authentication enabled. Apple's documentation doesn't mention that it's needed and so some firms may assume the MDM does this.
The problem with only using a serial number to add devices to a DEP is that these are often available freely online and they are not considered 'secret' information that needs to be encrypted, so sometimes are inadvertently revealed.
Another problem identified by the researchers revealed that an attacker could find serial numbers of devices using open source intelligence, brute force attacks or social engineering. Because the DEP provides data such as phone numbers and email addresses, a criminal could attack the company's help desk or IT team.
Because Apple doesn't use anything but the devices serial number to identify the user as a necessity, it's quite easy for criminals to break in. If Apple made it a requirement for businesses to also insist upon user authentication as a security method, businesses would be better protected against these attacks.
"Or in configurations where an associated MDM server does not enforce additional authentication, a malicious actor can potentially enrol an arbitrary device into an organization's MDM server," James Barclay senior R&D engineer at Duo Security said.
"The ability to enroll a chosen device to an organization's MDM server can have a significant consequence, subsequently allowing access to the private resources of an organization, or even full VPN access to internal systems."
Key considerations for implementing secure telework at scale
Identifying the security risks and advanced requirements of a remote workforceDownload now
The State of Salesforce 2020
Your guide to getting the most from SalesforceDownload now
Fast, flexible and compliant e-signatures for global businesses
Be at the forefront of digital transformation with electronic signaturesDownload now
Rethink your cybersecurity strategy for the new world
5 steps to secure the enterprise and be fit for a flexible futureDownload now