Apple rolls out fix for password reset security hole, iForgot site back up
Apple’s iForgot (opens in new tab) password reset page is now back online, and iMore has verified that the security hole, discovered earlier today in Apple’s password reset page, has been closed.
Previously, after providing a victim’s Apple ID and date of birth, an attacker could send a URL to Apple that would change the password for that account, without needing to answer any security questions. In response, Apple blocked access to the password reset page, and a short while later took the entire site down in light of another loophole that still allowed the attack to be performed.
This vulnerability came at an interesting time, just a day after Apple began to roll out its two-step verification system. Users who had already enrolled in the new system seem to have been immune from the password reset vulnerability.
Unfortunately some users were held in a three-day waiting period for enabling two-step verification, while others live in countries where two-step verification is not currently available.
Today’s events serve as an important example of why two-step verification is a good idea. People interested in getting two-step verification set up can find out how with iMore’s tutorial.
Update: Details on how the exploit worked can be found here.
Get the best of iMore in your inbox, every day!
Released January 28, 2013 (54 days ago) Since that time, 3 point release, averaging one every 18 days.
6.1.1 - 2/6/13 (9 days, 4S only/3G issue)
6.1.2 - 2/19/13 (13 days, Exchange bug)
6.1.3 - 3/19/13 (31 days, Passcode bypass) I anticipate 6.1.4 within a week to patch the remove sim passcode bypass) This is pretty quick for client systems. The fix today was backend, with less variables.