Close
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
eWEEK.com
Search
eWEEK.com
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Apple
    • Apple
    • Cybersecurity
    • Mobile

    Apple FaceTime at Risk From Severe Flaw

    By
    SEAN MICHAEL KERNER
    -
    January 29, 2019
    Share
    Facebook
    Twitter
    Linkedin
      Apple FaceTime flaw

      Since the invention of the telephone by Alexander Graham Bell in 1876, the basic protocol for any type of voice communication has been that the receiver needs to pick up the phone in order to start the call.

      That basic premise has carried forward to the digital age, but it’s one that has now been challenged by a severe flaw in Apple’s FaceTime application. A vulnerability that first became public knowledge on Jan. 28 could enable a caller to hear audio from the receiver’s end before the call is accepted. FaceTime is an integrated application that is included in Apple’s iOS mobile operating system as well as its macOS desktop operating system.

      Apple has stated that it is aware of the issue and is planning on releasing an update. Apple has also temporarily shut down its Group FaceTime service feature at the back-end server, to help further mitigate the risk. Additionally, until a formal patch is available, Apple users are advised to disable FaceTime on their devices.

      While some application vulnerabilities are difficult to enable, the FaceTime flaw is relatively trivial to execute.

      To trigger the flaw, an individual need only call another person with FaceTime and before the other person picks up, the caller can swipe up and add their own number to the call as a Group FaceTime call, and an active call will begin. As an active call, FaceTime begins sending audio from the receiver’s device, even though they have not yet accepted the call. Adding further insult to injury, the receiver has no indication that a call has begun or that FaceTime is transmitting any audio or video.

      FaceTime Vulnerabilities

      The newly disclosed flaw is the latest in a string of Facebook issues that Apple has had to deal with in recent months. Just last week, on Jan. 22, the iOS 12.1.3 update patched the CVE-2019-6224 flaw in FaceTime that could have enabled a remote attacker to start a FaceTime call without authorization. 

      In December 2018, Apple patched another high-impact flaw in FaceTime with the iOS 12.1.1 update. That flaw involved a passcode bypass identified as CVE-2018-4430 that could have enabled an attacker to bypass the iOS passcode.

      Industry Reaction

      George Gerchow, CSO of SumoLogic, commented that even though Apple has taken great strides to protect its users’ information, this latest bug is yet another reinforcement that privacy continues to remain a major concern regardless of a company’s size or security and privacy investments. 

      “It’s also another reminder that nobody’s data is 100 percent safe and that it’s all of our responsibility to be more diligent in protecting the privacy of our customers’ sensitive information against future vulnerabilities,” Gerchow said.

      Amit Sethi, senior principal consultant at Synopsys, said the FaceTime bug illustrates the privacy issues caused by surrounding ourselves with devices containing cameras and microphones. 

      “Phones, tablets, laptops, smart TVs, smart speakers, etc., contain microphones that can be listening to you at any point,” Sethi stated. “If the software on the devices is not malicious and doesn’t contain bugs like this, the microphones should only be on at times you expect.”

      Sethi added that the problem is that users don’t know when devices are listening as most modern devices don’t have an indicator like an LED that turns on whenever the camera and/or microphone is on. 

      “If you need to be 100 percent certain that you aren’t being recorded, don’t have any internet-connected devices with microphones or cameras around,” Sethi said.

      Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      CHRIS PREIMESBERGER - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      CHRIS PREIMESBERGER - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      EWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      ZEUS KERRAVALA - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      WAYNE RASH - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more
      eWeek


      Contact Us | About | Sitemap

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Property of TechnologyAdvice.
      Terms of Service | Privacy Notice | Advertise | California - Do Not Sell My Info

      © 2020 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×