iTnews

Apple silently patched zero-click iOS 'WifiDemon' remote code execution bug

By Juha Saarinen on Jul 19, 2021 6:35AM
Apple silently patched zero-click iOS 'WifiDemon' remote code execution bug

Leaving wi-fi on with default settings enough to be vulnerable.

Security researchers say Apple quietly patched a format-string bug in the wi-fi feature of its iOS mobile operating system that required no user interaction such as clicking for attackers to exploit and run arbitrary code on target devices.

The flaw has been named WiFiDemon by security vendor ZecOps.

ZecOps said it was patched by Apple in iOS 14.4, having been around since iOS 14.0.

Apple did not assign a Common Vulnerabilities and Exposures (CVE) index to the bug, which was reported to the company by an anonymous researcher.

Exploiting the bug requires iOS to be set to the default Auto-Join WiFi networks, a convenience feature that ZecOps now suggest users should disable.

Originally, it was thought that users needed to be tricked into connecting to wi-fi networks with strange Service Set Identifiers (SSID) names like %s%s%s to exploit them, something that ZecOps thought was unlikely to happen.

However, further analysis by ZecOps suggests that by simply leaving wi-fi urned on and the device in proximity to a malicious access point, the WiFiDemon vulnerability can be exploited with no user interaction required.

Such attacks could be hard to spot, ZecOps noted.

"This zero-click vulnerability is powerful: if the malicious access point has password protection and the user never joins the wi-fi, nothing will be saved to the disk," the researchers wrote.

"After turning off the malicious access point, the user’s wi-fi function will be normal.

"A user would hardly notice if they have been attacked."

The first details of a related bug were made public on June 19 this year when researcher Carl Schou posted that joining a wi-fi access point with the SSID set to %p%s%s%s%s%n would crash and disable his iPhone's wireless network functionality, leading to a denial of service attack scenario.

Another researcher, Perry Lorimer, pointed to the %n format string which Apple has now removed support for. 

%p is output a pointer.
%s is output a null terminated string.
And %n is nasty: it's write the number of bytes so far into the argument.

C doesn't check that there are arguments for this and that they are the right type. So if you have more % than args then it'll probably crash

— Perry Lorier (@isomer) June 18, 2021

Lorier told iTnews that %n "is dangerous as it instead overwrites a variable with how many bytes have been output so far, [and] if used incorrectly it can trivially corrupt memory."

Restoring wi-fi functionality requires a network settings reset to stop the wifid process from trying to read the problematic SSID from a file written to iOS system storage.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
appleiossecuritywifidemonzecops

Partner Content

5 essential digital transformation ideas
Promoted Content 5 essential digital transformation ideas
Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations
Security through visibility: supporting Essential Eight cyber mitigation strategies
Promoted Content Security through visibility: supporting Essential Eight cyber mitigation strategies
DoT Victoria turns to Oracle to implement unified cloud-based platform
Promoted Content DoT Victoria turns to Oracle to implement unified cloud-based platform

Sponsored Whitepapers

Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership
Don’t pay the ransom: A three-step guide to ransomware protection
Don’t pay the ransom: A three-step guide to ransomware protection

Events

  • iTnews Benchmark Awards 2022 - Finalist Showcase
  • 11th Annual Fraud Prevention Summit 2022
  • IoT Impact Conference
  • Cyber Security for Government Summit
By Juha Saarinen
Jul 19 2021
6:35AM
0 Comments

Related Articles

  • Emergency patches out for exploited Apple zero-days
  • Surprise Apple macOS and iOS updates fix a slew of vulnerabilities
  • Apple patches exploited iOS and macOS zero-day
  • Apple patches iOS 12 after bugs are exploited
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Kmart Australia stands up consent-as-a-service platform

Kmart Australia stands up consent-as-a-service platform

Telstra to open its 5G network to wholesale customers

Telstra to open its 5G network to wholesale customers

Macquarie Bank creates a broker portal on Salesforce

Macquarie Bank creates a broker portal on Salesforce

Active Directory defaults lead to no-fix PrivEsc vulnerability

Active Directory defaults lead to no-fix PrivEsc vulnerability

Digital Nation

Case Study: PlayHQ leverages graph technologies for sports administration
Case Study: PlayHQ leverages graph technologies for sports administration
The other ‘CTO’: The emerging role of the chief transformation officer
The other ‘CTO’: The emerging role of the chief transformation officer
As NFTs gain traction, businesses start taking early bets
As NFTs gain traction, businesses start taking early bets
Metaverse hype will transition into new business models by mid decade: Gartner
Metaverse hype will transition into new business models by mid decade: Gartner
COVER STORY: From cost control to customer fanatics, AI is transforming the contact centre
COVER STORY: From cost control to customer fanatics, AI is transforming the contact centre
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.