Zero-Click exploit allowed attackers to hack any targeted iPhone

Zero-Click exploit allowed attackers to hack any targeted iPhone

The iOS vulnerability allowed hackers to control your iPhone within radio proximity using AWDL.


Google’s Project Zero team member and security researcher, Ian Beer, discovered a new iOS vulnerability that allowed attackers to remotely gain access and control of almost any iPhone.


All hackers had to do was be within radio proximity of the device and exploit the AWDL, Apple’s proprietary wireless mesh networking protocol. 


Dubbed as this year’s most sophisticated iPhone vulnerability; this memory corruption flaw was identified in the iOS kernel. It was a serious flaw because if exploited, it would give attackers full remote access to the device over the air, without involving any user interaction.


See: No more targeted ads on iPhone after new iOS 14 update – Facebook


Moreover, it was a wormable exploit since radio proximity exploits can spread from one device to another, falling within the same proximity without user interaction.


AWDL is a cornerstone technology designed to power Sidecar, AirDrop, and similar other tentpole connective functions.


Beer tweeted about the discovery explaining how hackers can manipulate AWDL from a distance of hundreds of meters.



“AWDL is enabled by default, exposing a large and complex attack surface to everyone in radio proximity. With specialist equipment, the radio range can be hundreds of meters or more,” the tweet read.


The ex ..

Support the originator by clicking the read the rest link below.