IT Home, December 2 News Today, Google’s Project Zero security researcher Ian Beer (Ian Beer) revealed that before May, Apple’s iPhone and other iOS devices had an incredible vulnerability that could allow attackers to remotely reboot and Full control of the device from a distance, including reading emails and other information, downloading photos, and possibly even monitoring and monitoring users through the iPhone’s microphone and camera.
How is such a thing possible? According to Beer, this is because today’s iPhone, iPad, Mac and Watch use a protocol called Apple Wireless Direct Link (AWDL) for AirDrop (so you can easily transfer photos and files to other iOS On the device) and Sidecar (to quickly turn the iPad into a secondary screen) and other functions create a mesh network. Not only did Beer figure out a way to use it, he also found a way to force AWDL to be turned on, even if it had not been turned on before.
Although Beer said that he "has no evidence that these problems have been exploited by hackers," and admitted that it took him a full six months to find, verify, and demonstrate the vulnerability, he advised us not to underestimate the existence of such hackers. It should be pointed out that Apple has patched this vulnerability in May.
Apple did not immediately respond to a request for comment, but IT Home learned that the company did mention Beer when describing related vulnerabilities in several change logs of its May 2020 security update.