Apple iOS 8 Makes Public WiFi Dangerous, a New Vulnerability Found

Keep your eyes open: all the iOS gadgets can be defenseless against assailants who can attack Apple iPads, IPods and iPhones when they are associated with any remote hotspot. That is indicated by the “No iOS Zone,” a vulnerability uncovered via experts from security firm Skycure, at the conference of RSA in San Francisco.

All that a hacker needs to do to exploit the weakness is to situated up a router in a “particular settings”, and permit anybody to connect (essentially make it an open hotspot). The iOS 8 gadgets that connect will be influenced, without the hacker needing to have admittance to them.

During the presentation via CTO of mobile security at Skycure, Yair Amit and its Adi Sharabani (CEO) offered insights about a vulnerability the Skycure discovered in iOS 8 system.

In an article Amit wrote, “One day, during preparation for a demonstration of a network Relevant Products/Services-based attack Relevant Products/Services, we bought a new router. After setting the router in a specific configuration and connecting devices to it, our team witnessed the sudden crash of an iOS app. After a few moments, other people started to notice crashes. Pretty quickly, we realized that only iOS users were suffering from crashes.”

The DOS (denial-of-service) is activated by controlling SSL certificates being led to the iOS gadgets over Wi-Fi; expressly created data will bring about applications or potentially the OS (Operating System) to crash.

Skycure has informed the vulnerability to Apple company, however since the security flaw hasn’t yet been affirmed as completely fixed, Apple isn’t giving any comprehensive technical information on the details of the defect.

The WiFi problem Skycure utilized in tandem with its parsing certificate vulnerability really goes back to 2013. Experts at the firm figured out how to craft their private Wifi and force external gadgets to link with it, automatically. Named WiFiGate, the vulnerability could get a client to join an assailant’s dummy WiFi without their assent.

Amit said that, “Basically, by generating a specially crafted SSL certificate, attackers can regenerate a bug and cause apps that perform SSL communication to crash at will.”

A senior security expert at Rapid7, Guillaume Ross, expressed to eSecurity Planet via email that the vulnerability which is discover by Skycure advise again to be more vigilant while connecting to public Wifi hotspots.

Ross said, “While this vulnerability can allow an attacker to crash an application or a device, there were and will be other vulnerabilities that would allow an attacker in control of the Wi-Fi network to read, modify and snoop on network traffic in general. When using any network that you do not own, such as at a hotel, airport or coffee shop, make sure you use a VPN service to encrypt the data coming from your device, and reduce the odds of someone being able to snoop or manipulate it, to steal information or impact your device.”

He also added, “Users should also ensure they install iOS updates rapidly, and companies should monitor user activity to identify at risk users with old, known vulnerable versions.”

A security expert at Tripwire, Craig Young, told in an interview with cio-today that for Apple Company, April has been a testing month concerning vulnerabilities, Dos (denial-of-service) and other attacks. Just before the Skycure report, a little earlier a report came from Kaspersky that an exceptionally made internet protocol datagram could bring about different OS X and iOS frameworks to crash.

Young stated, “This latest issue from Skycure is an SSL certificate parsing error capable of causing app crashes and even reboot loops as crafted certificates are parsed. It is also worth noting that the Kaspersky ‘Darwin Nuke‘ finding can also be used to create a ‘No iOS Zone’ that appears to match the Skycure description, with the exception there appears to be more devices affected by this SSL parsing bug than the Darwin Nuke attack.”

SG (Security Gladiators) suggests making the accompanying moves to avoid from being affected by the vulnerability:

  • Users ought to detach from the bad Wi-Fi system or alter their area in case that they encounter constant rebooting or crashing
  • The most recent iOS 8.3 upgrade may have resolved a couple of the said dangers – users are profoundly encouraged to update to the most recent version
  • Generally, users ought to avoid from joining with any doubtful “open” Wi-Fi. Although Google VPN is on the way to protect open Wifi, let see when it become feasible…

Adi Sharabani the CEO of Skycure said, “As the vulnerability has not been confirmed as fully fixed yet, we’ve decided to refrain from providing additional technical details, in order to make sure iOS users are not exposed to the exploit caused by this vulnerability.”

Installing iOS 8.3 is likewise a smart thought, as Skycure notes that it may have fix the vulnerability. Also, obviously, clients can (and ought to) stay away from open/free hotspots, which are mostly unstable.

Ali Raza Ali is a freelance journalist, having 5 years of experience in web journalism and marketing. He contributes to various online publications. With a Master degree, now he combines his passions for writing about internet security and technology for SecurityGladiators. When he is not working, he loves traveling and playing games.
Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.