Apple expands bug bounty program, opens it to all researchers, raises rewards

Apple expands bug bounty program, opens it to all researchers, raises rewards

Three years ago at the Black Hat conference, Apple announced its first bug bounty program, which was invite-only and limited to iOS.


At this year’s edition of the con, Ivan Krstić, Apple’s head of security engineering and architecture, announced changes to it.


Wider scope, higher bug bounties


Starting this fall, the program will be open to all researchers.



Apple Bug Bounty. pic.twitter.com/jyD9UwU9pI


— mikeb (@mikebdotorg) August 8, 2019


The bug bounty program has been widened to include the following “targets”: macOS, iCloud, tvOS, watchOS and iPadOS (an upcoming mobile OS for iPads).


Maximum payouts for specific bugs are as follows:


  • Unauthorized access to iCloud account data on Apple servers – $100,000

  • Attack via physical access
  • Lock screen bypass – $100,000

  • User data extraction – $250,000


  • Attack via user-installed app
  • Unauthorized access to high-value user data – $100,000

  • Kernel code execution – $150,000

  • CPU side channel attack on high-value user data – $250,000


  • Network attack requiring user interaction
  • One-click unauthorized access to high-value user data – $150,000

  • One-click kernel code execution – $250,000


  • Network attack with no user interaction
  • Zero-click radio to kernel with physical proximity – $250,000

  • Zero-click access to high-value user data – $500,000

  • Zero-click kernel code execution with persistence – $1,000,000


  • If any of these bugs is found in pre-release builds, researchers can also earn a hefty bonus (up to 50% of the reward amount).


    The iOS Security Research ..

    Support the originator by clicking the read the rest link below.