Update Glass Cage Report.md

This commit is contained in:
Joseph Goydish II
2025-11-25 22:52:04 -05:00
committed by GitHub
parent 843a862237
commit 499edde553

View File

@@ -2,7 +2,7 @@
**Prepared By:** Joseph Goydish II
**Date Submitted to Vendor:** December 18, 2024
**CVE Identifiers:** CVE-2025-24085 (Core Media Privilege Escalation), CVE-2025-24201 (WebKit RCE)
**CVE Identifiers:** CVE-2025-24085 (Core Media Privilege Escalation), CVE-2025-24201 (WebKit RCE), CVE-2025-43300
**Affected Devices:** iPhone 14 Pro Max, iOS 18.2.1
---
@@ -56,7 +56,7 @@ The exploit is **completely silent**, requiring **no user interaction**, and per
### **Stage 2 — Delivery via iMessage (confirmed zero-click)**
### **Stage 2 — Delivery via iMessage (CVE-2025-43300)**
- **Delivery Method:** PNG container sent over iMessage.
- **Zero-click Behavior:** On receipt, the system automatically stages the attachment and generates a thumbnail—no user interaction required.
@@ -83,7 +83,6 @@ The exploit is **completely silent**, requiring **no user interaction**, and per
- `MessagesBlastDoorService` log shows auto-decoding activity during staging.
- `UserNotificationsServer` log shows the secure-copy staging step, which triggers thumbnail generation and decoder invocation.
---
### Outcome
- **Confirmed impact:** Heap corruption in `ATXEncoder` and WebKit during thumbnail generation results in **reliable zero-click remote code execution**.