Feeds

Apple pulls iForgot password recovery system over security bug

Two-factors forward, one step back

Website security in corporate America

Updated Don't get too hammered this Friday night in case you wake up to find you've forgotten your Apple password, as Cupertino has been forced to pull down its iForget service due to an embarrassing new security flaw.

This was supposed to be a good week for Apple on the security front. On Tuesday the company fixed a password-bypass flaw in iOS with its latest 6.1.3 update, and Apple finished the week with the introduction of two-factor authentication for its users on Friday.

But then came a tip to The Verge of a flaw in the iForget password retrieval system. With just the email address and date of birth of an Apple user, you could get a password reset request granted using a modified URL in the date-of-birth box on the iForgot security web page. Done correctly, this would allow an attacker full access to iTunes and iCloud accounts.

Step-by-step instructions detailing how to carry out the low-skill hack were found online, and Apple moved quickly to pull down the iForget system by 1pm PT (10pm UTC) Friday. It is working to fix the fatal flaw, but until it does, don't forget your password.

"Apple takes customer privacy very seriously. We are aware of this issue, and working on a fix," said the company in a statement.

When news of the bug broke, some of the more – ahem – excitable members of the anti-Apple movement pointed out that the only way to get around the flaw was to use Cupertino's new two-factor security system, and wasn't that convenient timing. Apple's prompt iForget pull-down rather negates that argument but it won't stop those fond of tin-foil headwear from speculating. ®

Update

The security hole was fixed as of Friday night, and the iForgot web site is now up and running again.

Protecting users from Firesheep and other Sidejacking attacks with SSL

More from The Register

next story
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Home Depot: 56 million bank cards pwned by malware in our tills
That's about 50 per cent bigger than the Target tills mega-hack
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Critical Adobe Reader and Acrobat patches FINALLY make it out
Eight vulns healed, including XSS and DoS paths
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.