Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New MobileGestalt Exploit for iOS 26.0.1 Enables Unauthorized Writes to Protected Data

Posted on November 17, 2025November 17, 2025 By CWS

A sandbox escape vulnerability affecting iPhones and iPads operating iOS 16.2 beta 1 or earlier variations. The proof-of-concept (POC) exploits weaknesses within the itunesstored and bookassetd daemons, enabling attackers to switch delicate recordsdata on the machine’s Knowledge partition areas usually shielded from unauthorized entry.

Researcher Kim shared the small print in a weblog submit on October 20, 2025, emphasizing that the findings stem from her reverse engineering efforts and urging readers to confirm independently.

The vulnerability hinges on a maliciously crafted “downloads.28.sqlitedb” database, which tips the itunesstored daemon into downloading and putting a secondary database, “BLDatabaseManager.sqlite,” right into a shared system group container.

Whereas itunesstored operates underneath strict sandbox limits, the next stage leverages bookassetd a daemon dealing with iBooks downloads with broader permissions.

MobileGestalt Exploit

This permits writes to mobile-owned paths like /non-public/var/cell/Library/FairPlay/, /non-public/var/cell/Media/, and even system caches resembling /non-public/var/containers/Shared/SystemGroup/systemgroup.com.apple.mobilegestaltcache/Library/Caches/com.apple.MobileGestalt.plist.

In a demo on an iPhone 12 operating iOS 16.0.1, Kim modified the MobileGestalt cache to spoof the machine as an iPod contact (mannequin iPod9,1), proving the exploit’s attain.

The method requires making ready the goal file in a modified EPUB format, zipped with out compressing the mimetype file, and internet hosting supporting property like iTunesMetadata.plist on a server.

Attackers should then use instruments like 3uTools or afcclient to inject the databases into /var/cell/Media/Downloads/, adopted by focused reboots to set off the downloads.

Anticipated conduct halts writes to unauthorized paths, however the flaw permits modifications except the vacation spot is root-controlled.

Kim lists quite a few writable areas, together with caches and media directories, probably enabling persistence, configuration tampering, or information exfiltration.

The exploit requires bodily or tethered entry to put the database, however as soon as arrange, it might facilitate extra subtle assaults on jailbroken or compromised gadgets.

Apple has not but commented, and Kim notes the difficulty could also be patched imminently. She gives primary recordsdata on GitHub for academic use, stressing that the analysis is for studying solely and never for unlawful actions.

As iOS evolves with tighter sandboxing, this POC underscores ongoing challenges in daemon isolation. Safety groups ought to monitor for associated indicators, like anomalous database entries in obtain logs.

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:26.0.1, Data, Enables, Exploit, IOS, MobileGestalt, Protected, Unauthorized, Writes

Post navigation

Previous Post: Logitech Confirms Data Breach Following Designation as Oracle Hack Victim
Next Post: Dragon Breath Uses RONINGLOADER to Disable Security Tools and Deploy Gh0st RAT

Related Posts

GitHub Enhances NPM’s Security with Strict Authentication, Granular Tokens, and  Trusted Publishing Cyber Security News
Django Critical Vulnerability Let attackers Execute Malicious SQL Code on Web Servers Cyber Security News
New Web3 Phishing Attack Leverages Fake AI Platforms to Steal Usernames and Passwords Cyber Security News
New “123 | Stealer” Advertised on Underground Hacking Forums for $120 Per Month Cyber Security News
New Polymorphic Python Malware Repeatedly Mutate its Appearance at Every Execution Time Cyber Security News
Ukrainian Web3team Weaponizing NPM Package to Attack Job Seekers and Steal Sensitive Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Attacking Palo Alto Networks’ GlobalProtect VPN Portals with 2.3 Million Attacks
  • Palo Alto Networks to Acquire Observability Platform Chronosphere in $3.35 Billion Deal
  • How to Solve Alert Overload in Your SOC
  • Amazon Details Iran’s Cyber-Enabled Kinetic Attacks Linking Digital Spying to Physical Strikes
  • Secure.com Raises $4.5 Million for Agentic Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Attacking Palo Alto Networks’ GlobalProtect VPN Portals with 2.3 Million Attacks
  • Palo Alto Networks to Acquire Observability Platform Chronosphere in $3.35 Billion Deal
  • How to Solve Alert Overload in Your SOC
  • Amazon Details Iran’s Cyber-Enabled Kinetic Attacks Linking Digital Spying to Physical Strikes
  • Secure.com Raises $4.5 Million for Agentic Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News