Security expert Bobby Rauch has publicly disclosed a vulnerability in Apple’s AirTags which gives attackers the privilege to drop a maliciously prepared AirTag.
According to Rauch, Apple’s AirTag is not able to sanitize user input, because while an attacker only needs to enter valid XSS in the field of the AirTag phone number, put the AirTag into Lost Mode and place it in a location where the target can find it, scanning a lost AirTag allows the website “Found. apple.com” to embed the contents of the phone number field in the website as it appears in the victim’s browser.
For Rauch, one prominent way to exploit the vulnerability is to open a fake iCloud login dialog on the victim’s phone with a simple XSS.
As soon as the website embeds the XXS in the response for a scanned AirTag, the victim receives a pop-up window displaying the contents of badside.tld/page.html which could be a zero-day exploit.
While Rauch first reported the vulnerability to Apple and asked when it would be fixed, the company has been saying for three months that it is investigating the issue that led Rauch to make the vulnerability public.
For more information, read the original story in Arstechnica.