Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: CocoaPods Vulnerabilities from 2014 Endanger Millions of Apple Devices
Newsletter
Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: CocoaPods Vulnerabilities from 2014 Endanger Millions of Apple Devices
Newsletter
Search
  • Latest Stories
  • Security & Tech
    • Security
    • Vulnerabilities
    • Dark Web
    • Technology
    • Privacy
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
© MRS Media Company. Hackerdose LLC. All Rights Reserved.

Vulnerabilities » CocoaPods Vulnerabilities from 2014 Endanger Millions of Apple Devices

Vulnerabilities

CocoaPods Vulnerabilities from 2014 Endanger Millions of Apple Devices

Historical CocoaPods vulnerabilities discovered in 2014 continue to pose a threat to the security of millions of Apple devices today.

Marco Rizal
Last updated: August 21, 2024 10:13 am
By Marco Rizal - Editor, Journalist 3 Min Read
Share
CocoaPods Vulnerabilities from 2014 Endanger Millions of Apple Devices
SHARE

Cybersecurity experts at E.V.A Information Security discovered significant vulnerabilities in CocoaPods, a widely utilized tool for app development on iPhones and Macs.

These vulnerabilities were discovered during a server update in 2014, which made thousands of app-building components susceptible to hackers.

The problems arise from an error that occurred during a CocoaPods update in 2014. This update caused a situation where approximately 1,866 parts of CocoaPods, also known as “pods,” were left without proper owners or protectors.

These pods, which were left without protection, became susceptible to attacks, enabling hackers to inject malicious code into them.

Given the widespread usage of these pods in popular apps across Apple devices, the potential impact of an attack could be significant.

A significant vulnerability, identified as CVE-2024-38366, arose due to a modification in the email address verification process employed by CocoaPods during registration.

This change introduced a vulnerability that could be taken advantage of by hackers to gain unauthorized access to the system, potentially resulting in data theft or the insertion of harmful code.

Additionally, the update was found to be associated with two other vulnerabilities, namely CVE-2024-38368 and CVE-2024-38367.

There was a vulnerability, CVE-2024-38368, that allowed hackers to manipulate orphaned pods and modify their contents. They were able to gain unauthorized access to their accounts by pretending to be legitimate users.

The vulnerabilities have a major impact as they are present in CocoaPods, which are widely used in applications developed by major tech companies such as Meta (owner of Facebook and WhatsApp), Apple (for apps like Safari and Xcode), and Microsoft (for Teams).

In addition, TikTok, Snapchat, and Netflix, along with other popular social media apps and entertainment services, also depend on CocoaPods.

Knowing that these applications amount to billions of users every month, the potential risk of the vulnerability can pose a serious threat to everyone who primarily uses an Apple device.

The vulnerabilities have been addressed and patched, however, the researchers have come across 685 Pods that rely on orphaned Pods. There is a strong possibility that there are numerous instances in proprietary codebases.

Security experts strongly recommend that developers who have used CocoaPods in their applications, especially prior to October 2023, should conduct thorough inspections and verification of their dependency lists.

More Stories

Chrome Exploited by Hackers Using a Fake Crypto Game

Bitcoin’s DoS Vulnerability Lets Hackers Crash Miners For Less Than 1% of a Block

Hackers May Use Telegram Video to Gain Full Control of Your Phone

Smishing Campaigns Continue to Target Apple IDs

Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Subscribe to our newsletter

Receive the latest news and stories straight to your inbox.

Latest stories

Grayscale Dogecoin ETF Makes Historic NYSE Trading Debut

November 24, 2025

Breaking: FBI Probes Cardano Network Split After Malicious Transaction

November 24, 2025

Bitcoin Holds at $85K as Global Trade Tensions and Fed Speculation Unfold

April 15, 2025

Michael Saylor Doubles Down on Bitcoin (BTC) with $285M Investment Amid Global Uncertainty

April 14, 2025

You might also like

Russia Denies Flaws In E Summons System

Russia Denies Flaws In E-Summons System

Hugging Face Chat Platform Vulnerabilities Exposed in New Security Research

Hugging Face Chat Platform Vulnerabilities Exposed in New Security Research

Security Flaw in BlueStacks Threatens Millions of Gamers

Security Flaw in BlueStacks Threatens Millions of Gamers

Google Patches Serious Android Security Flaws in September Update

Google Patches Serious Android Security Flaws in September Update

Newsletter

Our website stores cookies on your computer. They allow us to remember you and help personalize your experience with our site

Quick Links

  • Contact Us
  • Search
  • Malware
  • Downloads

Company

  • About Us
  • Terms and Conditions
  • Cookies Policy
  • Privacy Policy
Advertise with us

Socials

Follow Us

© 2025 | HackerDose Media Company – All Rights Reserved

Welcome Back!

Sign in to your account

Lost your password?