Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: CocoaPods Vulnerabilities from 2014 Endanger Millions of Apple Devices
Newsletter
Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: CocoaPods Vulnerabilities from 2014 Endanger Millions of Apple Devices
Newsletter
Search
  • Latest Stories
  • Security & Tech
    • Security
    • Vulnerabilities
    • Dark Web
    • Technology
    • Privacy
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
© MRS Media Company. Hackerdose LLC. All Rights Reserved.

Vulnerabilities » CocoaPods Vulnerabilities from 2014 Endanger Millions of Apple Devices

Vulnerabilities

CocoaPods Vulnerabilities from 2014 Endanger Millions of Apple Devices

Historical CocoaPods vulnerabilities discovered in 2014 continue to pose a threat to the security of millions of Apple devices today.

Marco Rizal
Last updated: August 21, 2024 10:13 am
By Marco Rizal - Editor, Journalist 3 Min Read
Share
CocoaPods Vulnerabilities from 2014 Endanger Millions of Apple Devices
SHARE

Cybersecurity experts at E.V.A Information Security discovered significant vulnerabilities in CocoaPods, a widely utilized tool for app development on iPhones and Macs.

These vulnerabilities were discovered during a server update in 2014, which made thousands of app-building components susceptible to hackers.

The problems arise from an error that occurred during a CocoaPods update in 2014. This update caused a situation where approximately 1,866 parts of CocoaPods, also known as “pods,” were left without proper owners or protectors.

These pods, which were left without protection, became susceptible to attacks, enabling hackers to inject malicious code into them.

Given the widespread usage of these pods in popular apps across Apple devices, the potential impact of an attack could be significant.

A significant vulnerability, identified as CVE-2024-38366, arose due to a modification in the email address verification process employed by CocoaPods during registration.

This change introduced a vulnerability that could be taken advantage of by hackers to gain unauthorized access to the system, potentially resulting in data theft or the insertion of harmful code.

Additionally, the update was found to be associated with two other vulnerabilities, namely CVE-2024-38368 and CVE-2024-38367.

There was a vulnerability, CVE-2024-38368, that allowed hackers to manipulate orphaned pods and modify their contents. They were able to gain unauthorized access to their accounts by pretending to be legitimate users.

The vulnerabilities have a major impact as they are present in CocoaPods, which are widely used in applications developed by major tech companies such as Meta (owner of Facebook and WhatsApp), Apple (for apps like Safari and Xcode), and Microsoft (for Teams).

In addition, TikTok, Snapchat, and Netflix, along with other popular social media apps and entertainment services, also depend on CocoaPods.

Knowing that these applications amount to billions of users every month, the potential risk of the vulnerability can pose a serious threat to everyone who primarily uses an Apple device.

The vulnerabilities have been addressed and patched, however, the researchers have come across 685 Pods that rely on orphaned Pods. There is a strong possibility that there are numerous instances in proprietary codebases.

Security experts strongly recommend that developers who have used CocoaPods in their applications, especially prior to October 2023, should conduct thorough inspections and verification of their dependency lists.

More Stories

Major Security Flaws Found in Widely-Used Discourse Forum

Critical PHP Vulnerability Found in XAMPP

Fortinet’s FortiManager Zero-Day Flaw News Spreads Faster Than Their Fix

New WordPress Security Changes Could Shift the Game for Hackers

Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Subscribe to our newsletter

Receive the latest news and stories straight to your inbox.

Latest stories

Bitcoin Holds at $85K as Global Trade Tensions and Fed Speculation Unfold

April 15, 2025

Michael Saylor Doubles Down on Bitcoin (BTC) with $285M Investment Amid Global Uncertainty

April 14, 2025

Mantra Faces Crisis After OM Token Crashes 90% in a Day

April 14, 2025

Solana (SOL) on the Verge of a Breakout: Could $300 Be the Next Target?

April 14, 2025

You might also like

E Commerce Stores Vulnerability

Newly Discovered Vulnerability Poses Risk to Millions of Online Stores

ATM Machine Hacked to Show Hill Climb Racing Instead of Transactions

ATM Machine Hacked to Show Hill Climb Racing Instead of Transactions

9 iPhone Settings to Turn Off for Maximum Privacy

9 iPhone Settings to Turn Off for Maximum Privacy

Zero Day Vulnerability in Google Chrome

Zero-Day Vulnerability in Google Chrome Allegedly for Sale on Dark Web

Newsletter

Our website stores cookies on your computer. They allow us to remember you and help personalize your experience with our site

Quick Links

  • Contact Us
  • Search
  • Malware
  • Downloads

Company

  • About Us
  • Terms and Conditions
  • Cookies Policy
  • Privacy Policy
Advertise with us

Socials

Follow Us

© 2025 | HackerDose Media Company – All Rights Reserved

Welcome Back!

Sign in to your account

Lost your password?