Zero-Click Calendar invite vulnerability chain in macOS
Bug bounty size and delays
- Many expect at least a mid–high five- or six-figure bounty given Apple’s own “zero‑click sensitive data” range and reports of smaller flaws receiving ~$50k.
- Strong frustration that, two years after report and fix, no bounty has been paid, despite the researcher being credited in a CVE.
- Several commenters say long waits (year+ to fix, more to pay, even more to credit) are common and push people away from security research.
Apple’s bug bounty program and incentives
- One side argues large vendors are strongly incentivized to pay bounties: the money is trivial, bad press is costly, and program staff are usually rewarded for paying, not denying.
- Others counter with many public complaints about Apple’s program: understaffing, bureaucracy, shifting rules, and mismanagement that effectively disincentivize or delay payouts.
- Debate over whether problems are due to incompetence vs. conscious cost-cutting or PR‑only motives; consensus that regardless of cause, Apple should fix the program.
Alternative exploit markets and ethics
- Some claim selling to offensive actors (e.g., spyware vendors) would pay more and faster; others say that’s unlikely for macOS‑only exploits and ethically “cancerous.”
- Distinction drawn between broad, “any bug” bounties and highly selective offensive buyers who only pay for practical, maintainable exploits on high‑value platforms (iOS > macOS).
Scope and user interaction
- Clarified that this chain targets macOS via Calendar invites, not iPhone.
- Some confusion over whether it’s truly zero‑click; at least one comment suggests attachment interaction might be required, others treat it as fully zero‑click per the write‑up. Marked as unclear in the thread.
Calendar invites, spam, and UX trade‑offs
- Extended debate on whether anyone on the internet should be able to send calendar invites that auto‑appear.
- Suggestions: whitelists, domain/contacts gating, or explicit confirmation flows vs. practicality for recruiters, vendors, booking systems, and cross‑org meetings.
- Recognized that calendar invites are already a spam and phishing vector across ecosystems.
macOS security model (TCC, quarantine, /tmp, Photos)
- Multiple comments note that TCC/quarantine handling is inconsistent and “full of holes,” with too many subsystems able to toggle flags.
- One experiment shows Photos libraries in the default Pictures directory are protected by TCC, but a library moved to
/tmpis not, which is seen as baffling if relocation is officially supported. - Some argue
/tmpbeing historically world‑readable explains part of this, but others say the system should still protect user‑designated photo libraries regardless of location. - Mention of a separate write‑up on creating app folders without quarantine flags reinforces concern about systemic design issues.
Technical characterization of the bugs
- Commenters highlight that step 1 (path traversal via
FILENAME=../../../...) is itself a serious and surprisingly old‑fashioned bug. - The file overwrite/delete behavior inside the Calendar sandbox is called “bad engineering.”
- Several people relish that this is a non–memory‑safety exploit, undercutting the idea that Rust/“safe” languages eliminate major classes of vulnerabilities.
- Discussion touches on how to prevent such bugs: shared safe library functions, static analysis rules to forbid ad‑hoc path handling, and better internal reuse culture.
OS support duration and regulation
- Some skepticism that Apple’s extended OS support windows meaningfully protect users, given patch delays and older versions left vulnerable.
- Hopes expressed that EU rules (e.g., Cyber Resilience Act) will mandate longer and more consistent security support, though concerns that such regulation may be harder on small/open‑source projects than big vendors.