Apple Fails to Sanitize Phone Number Field for Lost AirTags

Share post:

Security expert Bobby Rauch has publicly disclosed a vulnerability in Apple’s AirTags which gives attackers the privilege to drop a maliciously prepared AirTag.

According to Rauch, Apple’s AirTag is not able to sanitize user input, because while an attacker only needs to enter valid XSS in the field of the AirTag phone number, put the AirTag into Lost Mode and place it in a location where the target can find it, scanning a lost AirTag allows the website “Found. apple.com” to embed the contents of the phone number field in the website as it appears in the victim’s browser.

For Rauch, one prominent way to exploit the vulnerability is to open a fake iCloud login dialog on the victim’s phone with a simple XSS.

As soon as the website embeds the XXS in the response for a scanned AirTag, the victim receives a pop-up window displaying the contents of badside.tld/page.html which could be a zero-day exploit.

While Rauch first reported the vulnerability to Apple and asked when it would be fixed, the company has been saying for three months that it is investigating the issue that led Rauch to make the vulnerability public.

For more information, read the original story in Arstechnica.

SUBSCRIBE NOW

Related articles

Cloudflare Launches Open Source Tool for Secure, Keyless SSH Authentication

Cloudflare has released an open-source tool called OPKSSH (OpenPubkey SSH), which allows developers and IT teams to use...

US Defence Contractor Fined 4.6 Million For Failing To Meet Cyber Security Requirements.

A U.S. defence contractor, MORSE Corp, has agreed to pay $4.6 million to settle allegations of failing to...

Tech Aide on U.S. Government Efficiency Team Linked to Cybercrime Group

A 19-year-old staffer working on the U.S. Department of Government Efficiency (DOGE) initiative has been linked to a...

Top U.S. Security Officials Have Even More Data Exposed Through Public Apps, Chats, and Data Leaks

A new investigation has revealed that personal information belonging to senior U.S. security officials — including active phone...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways