Proof-of-Concept Exploit Code Published for Remote iPhone 7 WiFi Hack

LASER_oneXM

Level 37
Thread author
Verified
Top Poster
Well-known
Feb 4, 2016
2,520
A Google security researcher has published proof-of-concept code for a vulnerability that can be exploited remotely via a WiFi connection to take over iPhone 7 handsets.

"The exploit gains code execution on the Wi-Fi firmware on the iPhone 7," says Gal Beniamini, a member of the Google Project Zero security team.

"Upon successful execution of the exploit, a backdoor is inserted into the firmware, allowing remote read/write commands to be issued to the firmware via crafted action frames, thus allowing easy remote control over the Wi-Fi chip," Beniamini says.

The exploit works remotely, no user interaction needed, and can be used to target any user attempting to connect to a rogue WiFi network.

Vulnerability now fixed in iOS, tvOS, Android
The researcher published the exploit code today after Apple released security updates for iOS last week. The issue affects all iOS versions but was fixed with the release of iOS 11.

While the demo code works on iPhone 7 devices, the vulnerability at the heart of the issue affects a broad range of products, such Android handsets, smart TVs running tvOS, and other devices with Broadcom WiFi chips.

Apple also released a fix for tvOS, and Google patched the vulnerability in Android at the start of the month via the Android Security Bulletin 2017-09-05 security patch level.

Beniamini said the bug — tracked as CVE-2017-11120 — affects Broadcom WiFi chips running firmware version BCM4355C0, and all devices where these WiFi chips and firmware are deployed.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top