Apple Fails to Sanitize Phone Number Field for Lost AirTags

Share post:

Security expert Bobby Rauch has publicly disclosed a vulnerability in Apple’s AirTags which gives attackers the privilege to drop a maliciously prepared AirTag.

According to Rauch, Apple’s AirTag is not able to sanitize user input, because while an attacker only needs to enter valid XSS in the field of the AirTag phone number, put the AirTag into Lost Mode and place it in a location where the target can find it, scanning a lost AirTag allows the website “Found. apple.com” to embed the contents of the phone number field in the website as it appears in the victim’s browser.

For Rauch, one prominent way to exploit the vulnerability is to open a fake iCloud login dialog on the victim’s phone with a simple XSS.

As soon as the website embeds the XXS in the response for a scanned AirTag, the victim receives a pop-up window displaying the contents of badside.tld/page.html which could be a zero-day exploit.

While Rauch first reported the vulnerability to Apple and asked when it would be fixed, the company has been saying for three months that it is investigating the issue that led Rauch to make the vulnerability public.

For more information, read the original story in Arstechnica.

SUBSCRIBE NOW

Related articles

Exploited ChatGPT Vulnerability Poses Risks to Organizations

A server-side request forgery (SSRF) vulnerability in OpenAI's ChatGPT infrastructure, tracked as CVE-2024-27564, is being actively exploited by...

Free Online File Converters Found Installing Malware: Malwarebytes Sounds the Alarm

Cybersecurity company Malwarebytes is urging internet users to exercise caution when seeking free online file conversion tools, warning...

Researchers Crack Akira Ransomware Using High-End GPUs

The Akira ransomware group emerged in 2023 with a mix of dark humour and ruthless tactics, famously requesting...

DOGE Staffer Sends Unencrypted Personal Data

Court documents reveal that Marko Elez, a staff member of the Department of Government Efficiency (DOGE), breached Treasury...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways