{"id":49604,"date":"2025-10-10T16:52:35","date_gmt":"2025-10-10T20:52:35","guid":{"rendered":"https:\/\/mjtsai.com\/blog\/?p=49604"},"modified":"2025-12-02T16:26:48","modified_gmt":"2025-12-02T21:26:48","slug":"evolution-of-apple-security-bounty-program","status":"publish","type":"post","link":"https:\/\/mjtsai.com\/blog\/2025\/10\/10\/evolution-of-apple-security-bounty-program\/","title":{"rendered":"Evolution of Apple Security Bounty Program"},"content":{"rendered":"<p><a href=\"https:\/\/security.apple.com\/blog\/apple-security-bounty-evolved\/\">Apple<\/a> (<a href=\"https:\/\/www.wired.com\/story\/apple-announces-2-million-bug-bounty-reward\/\">Wired<\/a>, <a href=\"https:\/\/www.macrumors.com\/2025\/10\/10\/apple-bug-bounty-program-overhauled\/\">MacRumors<\/a>):<\/p>\n<blockquote cite=\"https:\/\/security.apple.com\/blog\/apple-security-bounty-evolved\/\">\n<p>We&rsquo;re doubling our top award to $2 million for exploit chains that can achieve similar goals as sophisticated mercenary spyware attacks. This is an unprecedented amount in the industry and the largest payout offered by any bounty program we&rsquo;re aware of &mdash; and our bonus system, providing additional rewards for Lockdown Mode bypasses and vulnerabilities discovered in beta software, can more than double this reward, with a maximum payout in excess of $5 million. We&rsquo;re also doubling or significantly increasing rewards in many other categories to encourage more intensive research. This includes $100,000 for a complete Gatekeeper bypass, and $1 million for broad unauthorized iCloud access, as no successful exploit has been demonstrated to date in either category.<\/p>\n<\/blockquote>\n<p>They&rsquo;re referring to a Gatekeeper bypass &ldquo;with no user interaction,&rdquo; but I don&rsquo;t really understand what that would mean. Doesn&rsquo;t Gatekeeper only come into play when there <em>is<\/em> user interaction? If there&rsquo;s no user interaction, that seems like it would be a zero-click exploit, which should be worth way more than $100K.<\/p>\n<blockquote cite=\"https:\/\/security.apple.com\/blog\/apple-security-bounty-evolved\/\"><p>In addition to increasing reward amounts and expanding bounty categories, we&rsquo;re making it easier for researchers to objectively demonstrate their findings &mdash; and to determine the expected reward for their specific research report. Target Flags, inspired by capture-the-flag competitions, are built into our operating systems and allow us to rapidly review the issue and process a resulting reward, even before we release a fix.<\/p><p>When researchers demonstrate security issues using Target Flags, the specific flag that&rsquo;s captured objectively demonstrates a given level of capability &mdash; for example, register control, arbitrary read\/write, or code execution &mdash; and directly correlates to the reward amount, making the award determination more transparent than ever. Because Target Flags can be programmatically verified by Apple as part of submitted findings, researchers who submit eligible reports with Target Flags will receive notification of their bounty award immediately upon our validation of the captured flag. Confirmed rewards will be issued in an upcoming payment cycle rather than when a fix becomes available, underscoring the trust we&rsquo;ve built with our core researcher community.<\/p><\/blockquote>\n\n<p><a href=\"https:\/\/mastodon.social\/@lapcatsoftware\/115350004211533182\">Jeff Johnson<\/a>:<\/p>\n<blockquote cite=\"https:\/\/mastodon.social\/@lapcatsoftware\/115350004211533182\"><p>A major evolution would be if Apple actually paid people who submitted bugs instead of arbitrarily deciding &ldquo;nope&rdquo;<\/p><\/blockquote>\n\n<p>The changes sound good, but this was my first thought, too. I think the problem with the bounty program wasn&rsquo;t that it didn&rsquo;t <em>claim<\/em> to pay enough or in enough categories. It was that Apple has a history of not counting exploits that seem like they should count, downgrading them to lower categories, delaying fixes and thus payments, and withholding payments until after being called out in the press. If you discover an exploit, it should be a no-brainer to write it up and submit it through the proper channels because you trust that Apple will take it seriously and that you&rsquo;ll get paid. But that&rsquo;s not the case from what I&rsquo;ve seen.<\/p>\n\n<p>Previously:<\/p>\n<ul>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2024\/10\/21\/tcc-and-gatekeeper-bypasses\/\">TCC and Gatekeeper Bypasses<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2024\/05\/14\/no-bounty-for-kernel-vulnerability\/\">No Bounty for Kernel Vulnerability<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2022\/01\/19\/an-examination-of-the-bug-bounty-marketplace\/\">An Examination of the Bug Bounty Marketplace<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2021\/10\/29\/denis-tokarevs-four-zero-days\/\">Denis Tokarev&rsquo;s Four Zero-Days<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2021\/09\/09\/security-researchers-unhappy-with-apples-bug-bounty-program\/\">Security Researchers Unhappy With Apple&rsquo;s Bug Bounty Program<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2021\/07\/13\/more-trouble-with-the-apple-security-bounty\/\">More Trouble With the Apple Security Bounty<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2021\/06\/23\/password-reset-icloud-account-vulnerability\/\">Password Reset iCloud Account Vulnerability<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2020\/12\/07\/tcc-doesnt-prevent-protected-folders-from-being-listed\/\">Sandbox Doesn&rsquo;t Protect Files From stat()<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2020\/10\/08\/we-hacked-apple-for-3-months\/\">We Hacked Apple for 3 Months<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2020\/07\/02\/safari-privacy-protections-bypass\/\">Safari Privacy Protections Bypass<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2020\/05\/19\/apple-vs-security-researchers\/\">Apple vs. Security Researchers<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2019\/10\/09\/file-system-events-privacy-protections-bypass\/\">File System Events Privacy Protections Bypass<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2019\/02\/07\/keysteal-mac-keychain-exploit\/\">KeySteal Mac Keychain Exploit<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2019\/01\/29\/major-facetime-privacy-bug\/\">Major FaceTime Privacy Bug<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2016\/08\/15\/apple-security\/\">Apple Security<\/a><\/li>\n<\/ul>\n\n<p id=\"evolution-of-apple-security-bounty-program-update-2025-10-15\">Update (<a href=\"#evolution-of-apple-security-bounty-program-update-2025-10-15\">2025-10-15<\/a>): See also: <a href=\"https:\/\/www.schneier.com\/blog\/archives\/2025\/10\/apples-bug-bounty-program.html\">Bruce Schneier<\/a>.<\/p>\n\n<p id=\"evolution-of-apple-security-bounty-program-update-2025-10-20\">Update (<a href=\"#evolution-of-apple-security-bounty-program-update-2025-10-20\">2025-10-20<\/a>): <a href=\"https:\/\/mastodon.social\/@rosyna\/115395295346331948\">Rosyna Keller<\/a>:<\/p>\n<blockquote cite=\"https:\/\/mastodon.social\/@rosyna\/115395295346331948\"><p>I&rsquo;m going to write a blog post about a privacy leak Apple fixed reluctantly, didn&rsquo;t get a CVE, and then Apple decided wasn&rsquo;t worth a bug bounty despite the very important information it leaked.<\/p><p>It&rsquo;s gotta be responsible to disclose it by now. But it was damn hard to find a phone that&rsquo;ll run iOS 18.7, because Apple decided not to fix it there.<\/p><\/blockquote>\n\n<p id=\"evolution-of-apple-security-bounty-program-update-2025-12-02\">Update (<a href=\"#evolution-of-apple-security-bounty-program-update-2025-12-02\">2025-12-02<\/a>): <a href=\"https:\/\/appleinsider.com\/articles\/25\/12\/02\/security-researcher-fumes-at-low-macos-bug-bounty-awards\">Malcolm Owen<\/a>:<\/p>\n<blockquote cite=\"https:\/\/appleinsider.com\/articles\/25\/12\/02\/security-researcher-fumes-at-low-macos-bug-bounty-awards\"><p>In October, Apple said that <a href=\"https:\/\/appleinsider.com\/articles\/25\/10\/10\/apple-is-about-to-give-more-generous-payouts-from-its-bug-bounty-program\">the payouts<\/a> in its <a href=\"https:\/\/security.apple.com\/bounty\/categories\/\">Security Bounty<\/a> program will increase considerably in November. While the bounties for some high-profile exploit chains have grown to as high as $2 million, complaints are being raised about other awards for some macOS categories. \n<\/p><p>In a post <a href=\"https:\/\/www.linkedin.com\/posts\/csaba-fitzl-5634472a_sarcasm-share-7401619351893770240-QC0D\/\">to LinkedIn<\/a>, IRU macOS security researcher Csaba Fitzl claims that the Apple Security Bounty &ldquo;devalued&rdquo; macOS. The devaluing is apparently demonstrated by the lowering of awards for disclosing some specific bypasses. \n<\/p><p>&ldquo;Full TCC (privacy) bypasses are down from $30.5k to $5k,&rdquo; Fitzl writes, while other individual TCC categories are reduced from payouts between $5,000 and $10,000 to just $1,000.<\/p><\/blockquote>\n\n<p><a href=\"https:\/\/9to5mac.com\/2025\/12\/02\/apple-security-bounties-slashed-as-mac-malware-grows\/\">Ben Lovejoy<\/a>:<\/p>\n<blockquote cite=\"https:\/\/9to5mac.com\/2025\/12\/02\/apple-security-bounties-slashed-as-mac-malware-grows\/\">\n<p>Fitzl notes that not many security researchers focus on the Mac platform, and with even smaller awards on offer that number is likely to further diminish. It also increases the risk that anyone discovering an exploit will decide to sell it on the black market rather than report it to Apple.<\/p>\n<p>It seems inexplicable that the company would make these changes at a time when there is more Mac malware than ever before.<\/p>\n<\/blockquote>\n\n<p>Previously:<\/p>\n<ul>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2025\/10\/28\/airtrafficdevice-ignored-reluctantly-fixed-no-cve-no-bounty\/\">AirTrafficDevice: Ignored, Reluctantly Fixed, No CVE, No Bounty<\/a><\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>Apple (Wired, MacRumors): We&rsquo;re doubling our top award to $2 million for exploit chains that can achieve similar goals as sophisticated mercenary spyware attacks. This is an unprecedented amount in the industry and the largest payout offered by any bounty program we&rsquo;re aware of &mdash; and our bonus system, providing additional rewards for Lockdown Mode [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"apple_news_api_created_at":"2025-10-10T20:52:38Z","apple_news_api_id":"7b992eda-f195-4feb-b6aa-eee39d313541","apple_news_api_modified_at":"2025-12-02T21:26:52Z","apple_news_api_revision":"AAAAAAAAAAAAAAAAAAAABA==","apple_news_api_share_url":"https:\/\/apple.news\/Ae5ku2vGVT-u2qu7jnTE1QQ","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_is_hidden":false,"apple_news_is_paid":false,"apple_news_is_preview":false,"apple_news_is_sponsored":false,"apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":"\"\"","apple_news_suppress_video_url":false,"apple_news_use_image_component":false,"footnotes":""},"categories":[2],"tags":[2098,2095,465,31,2741,30,2742,355,48,1960],"class_list":["post-49604","post","type-post","status-publish","format-standard","hentry","category-technology","tag-apple-security-bounty","tag-exploit","tag-gatekeeper","tag-ios","tag-ios-26","tag-mac","tag-macos-tahoe-26","tag-privacy","tag-security","tag-transparency-consent-and-control-tcc"],"apple_news_notices":[],"_links":{"self":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/49604","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/comments?post=49604"}],"version-history":[{"count":6,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/49604\/revisions"}],"predecessor-version":[{"id":50276,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/49604\/revisions\/50276"}],"wp:attachment":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/media?parent=49604"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/categories?post=49604"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/tags?post=49604"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}