From 00ca11c8d9e29bb9736013bc033635724f8e8b76 Mon Sep 17 00:00:00 2001 From: Joseph Goydish II Date: Tue, 23 Sep 2025 19:23:29 -0400 Subject: [PATCH] Update README.md --- README.md | 11 +---------- 1 file changed, 1 insertion(+), 10 deletions(-) diff --git a/README.md b/README.md index 8831b08..08329cb 100644 --- a/README.md +++ b/README.md @@ -18,15 +18,13 @@ https://ia600207.us.archive.org/11/items/fail-open-log-evidence-in-apple-media-s * Date: August 20, 2025 * Type: Active Zero-Day * Status: Unpatched -* CVSS (Preliminary): 9.1 Critical -* Vector: CVSS:3.1/AV\:N/AC\:L/PR\:N/UI\:N/S\:C/C\:L/I\:H/A\:N **Affected Systems** All Apple platforms that use `AppleMediaServices.framework` are affected. -Impacted daemons include: +**Impacted daemons include:** * appstored (App Store services) * amsengagementd (Media and preview endpoints) @@ -64,10 +62,6 @@ Result: Unsigned traffic is transmitted to Apple endpoints without verification. This allows manipulation, replay, and other integrity risks. -Disclaimer: - -This proof of concept was not executed against production Apple infrastructure. All observations are based on local logs and controlled network conditions. No unauthorized probing or exploitation was performed. - **Threat Models** * Rogue public Wi-Fi access points that prevent Bag retrieval @@ -97,9 +91,6 @@ This proof of concept was not executed against production Apple infrastructure. * Bypasses authentication headers * Enables replay and downgrade scenarios -CVSS Score (Preliminary): 9.1 Critical -Vector: CVSS:3.1/AV\:N/AC\:L/PR\:N/UI\:N/S\:C/C\:L/I\:H/A\:N - --- ## Why This Matters