Google's Project Zero uncovers iPhone zero-day Wi-Fi exploit

Buggy code in iOS could have been exploited by hackers to remotely take control of devices

Coffee drinker using a black iPhone 11

iPhone users could have had their devices remotely rebooted and controlled via an iOS exploit, Google's Project Zero has revealed. 

The vulnerability was patched by Apple in May, but a variety of iPhones and iOS devices, including the iPhone 11, were susceptible to the vulnerability, according to Project Zero security researcher Ian Beer.

The exploit could have allowed hackers to remotely reboot and take complete control of a device from a distance, enabling them to read emails, messages, download photos and even access the microphone and camera for surveillance purposes. 

This was possible because iPhones, iPads, Macs and Apple Watches all use a protocol called Apple Wireless Direct Link (AWDL) to build a mesh network for services such as AirDrop and Sidecar. 

Beer came across the exploit while reading through an iOS developer beta in 2018 that had the code for AWDL. Due to the amount of code running on iOS, along with the sheer amount of programmes it runs, Beer suggests that bugs are always "prevalent" and can often be spotted.

It took six months to develop the bug into an exploit and Beer stressed that there is no evidence of it being used in the wild. 

"The takeaway from this project should not be: no one will spend six months of their life just to hack my phone, I'm fine," Beer wrote in a blog post.

"Instead, it should be: one person, working alone in their bedroom, was able to build a capability which would allow them to seriously compromise iPhone users they'd come into close contact with."

IT Pro has approached Apple for comment, but the iPhone maker patched the vulnerability in March.

The company credited Beer in its changelogs for several of the security updates that are linked to the vulnerability. The tech giant has also pointed out that most iOS users are already using newer versions that have been patched and also suggested that an attacker would need to be in a short range of the Wi-Fi for it to work. 

Featured Resources

Next-generation time series: Forecasting for the real world, not the ideal world

Solve time series problems with AI

Free download

The future of productivity

Driving your business forward with Microsoft Office 365

Free download

How to plan for endpoint security against ever-evolving cyber threats

Safeguard your devices, data, and reputation

Free download

A quantitative comparison of UPS monitoring and servicing approaches across edge environments

Effective UPS fleet management

Free download

Recommended

Nigerian cyber criminals target Texas unemployment system
cyber security

Nigerian cyber criminals target Texas unemployment system

27 May 2021
Hackers use open source Microsoft dev platform to deliver trojans
Security

Hackers use open source Microsoft dev platform to deliver trojans

14 May 2021

Most Popular

UK spy agencies supercharge espionage efforts with AWS data deal
cloud computing

UK spy agencies supercharge espionage efforts with AWS data deal

26 Oct 2021
Best Linux distros 2021
operating systems

Best Linux distros 2021

11 Oct 2021
Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans
Laptops

Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans

11 Oct 2021