Skip to content

Glass Cage is a zero-click PNG-based RCE chain in iOS 18.2.1, exploiting WebKit (CVE-2025-24201) and Core Media (CVE-2025-24085) to achieve sandbox escape, kernel-level access, and device bricking. Triggered via iMessage, it enables full compromise with no user interaction.

Notifications You must be signed in to change notification settings

JGoyd/Glass-Cage-iOS18-CVE-2025-24085-CVE-2025-24201

Repository files navigation

Glass Cage: Zero-Click PNG Exploit Chain for iOS 18.2.1

CVE-2025-24201 – WebKit Remote Code Execution
CVE-2025-24085 – Core Media Privilege Escalation

Reported to Apple: January 9, 2025
Patched: February–March 2025
Tested On: iPhone 14 Pro Max (iOS 18.2.1)
CVSS Base Score: 9.8 (Critical)


Summary

Glass Cage is a critical, zero-click PNG-based exploit chain discovered in the wild targeting iOS 18.2.1. The attack was actively observed on a compromised device and confirmed to be used against real-world targets prior to vendor patching.

A malicious PNG image sent via iMessage initiates the chain by triggering automatic parsing in MessagesBlastDoorService. The image exploits a WebKit heap corruption vulnerability (CVE-2025-24201), followed by a sandbox escape and a kernel-level privilege escalation in Core Media (CVE-2025-24085).

The chain ultimately provides attackers with root-level access, persistent control, keychain exfiltration, and even the ability to irreversibly brick devices via IORegistry manipulation. No user interaction is required.


Exploit Chain

  1. Malicious PNG Creation

    • Embedded HEIF payloads with malformed EXIF fields
    • Triggers heap corruption in ATXEncoder
  2. Silent Trigger via iMessage

    • File auto-processed by MessagesBlastDoorService
    • RCE achieved through WebKit (CVE-2025-24201)
  3. Sandbox Escape

    • WebKit bypasses resource isolation to access private assets
  4. Privilege Escalation

    • Core Media flaw (CVE-2025-24085) enables kernel access
    • Exploits mediaplaybackd, codecctl, and IOHIDInterface
  5. Persistence and Bricking

    • Injects rogue daemons via launchd
    • Hijacks network through wifid
    • Bricks device via IORegistry modification

Indicators of Compromise

  • WebKit resource lookups for internal assets
  • Rogue IP assignment: 172.16.101.176
  • Modified proxy settings in wifid
  • Abnormal access to CloudKeychainProxy
  • IORegistry value: IOAccessoryPowerSourceItemBrickLimit = 0

Timeline

Date Event
Jan 9, 2025 Exploit chain observed in the wild
Jan 9, 2025 Initial report submitted to US Cert & Apple
Feb 20, 2025 CVE-2025-24085 patched (Core Media)
Mar 7, 2025 CVE-2025-24201 patched (WebKit)
Mar 18, 2025 CNVD-2025-06744 registered
Apr 22, 2025 CNVD-2025-07885 registered

Disclosure

This exploit chain was discovered being used in the wild and responsibly disclosed to Apple. Patches have since been released. At the time of discovery, active exploitation was confirmed.


CNVD Certification

This research has been independently verified and certified by the China National Vulnerability Database (CNVD). These official certificates confirm the high-risk status of both vulnerabilities used in the Glass Cage exploit chain:

  • CNVD-2025-07885 – Use-After-Free in Apple Media Services

  • CNVD-2025-06744 – Buffer Overflow in Apple iOS/iPadOS Core Media

Researcher: Joseph Goydish II Submission Type: Personal Researcher Submission
Certification Authority: CNCERT / CNVD


MITRE ATT&CK Mapping

Tactic Technique
Initial Access T1203 – Exploitation for Client Exec
Execution T1059 – Command and Scripting Interp
Persistence T1547 – Boot or Logon Autostart Exec
Privilege Escalation T1068 – Exploitation for Priv Esc
Defense Evasion T1140 – Deobfuscate/Decode Files
Impact T1499 – Endpoint Denial of Service

Legal Notice

This repository is provided for research and educational purposes only.
The techniques described must not be used against systems without proper authorization.
The author assumes no liability for misuse or damage resulting from the information contained herein.


References

  • CVE-2025-24085 – Core Media Privilege Escalation
  • CVE-2025-24201 – WebKit Remote Code Execution
  • CNVD-2025-06744 – iOS/iPadOS Buffer Overflow
  • CNVD-2025-07885 – Use-After-Free in Apple Media Services

About

Glass Cage is a zero-click PNG-based RCE chain in iOS 18.2.1, exploiting WebKit (CVE-2025-24201) and Core Media (CVE-2025-24085) to achieve sandbox escape, kernel-level access, and device bricking. Triggered via iMessage, it enables full compromise with no user interaction.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published