https://safirsoft.com Five months later, Apple still hasn't fixed an iOS bug that sends devices into a meltdown spiral
A denial of service vulnerability can be created by sending malicious HomeKit invitations. The factory does. "It follows recovery and other stressful steps," said one researcher.
HomeKit is a communication protocol developed by Apple that allows people to use their iPhone or iPad to control lights, televisions, alarms, and other home or office devices. Users can configure their devices to automatically detect devices on the same network, and they can also share these settings with others so they can use their iPhone or iPad to control the devices. The sharing feature allows newcomers, such as a babysitter or babysitter, to control a user's devices. This feature allows someone to send an iOS device into an endless cycle of failure. A very long name - up to 500,000 characters long - can be used to identify a smart device and then force the user to accept an invitation to that network.

Like the explainer videos below. It indicates that the device is not responding slowly until it is completely blocked. Rebooting the device does not help. A passphrase cannot be entered until the login screen appears. All you have to do is restore the factory. And even then, once the device is restored, it won't respond again once the user signs back into the iCloud account during startup. Invitation to home)

Spiniolas said he reported the bug to Apple in August and received a response saying it would be fixed by the end of the year. Later, the researcher said, Apple said the patch would take place in early 2022. At the time, he told the company that he intended to make the bug public.

"I believe this error is being handled incorrectly because it is causing a problem." Months passed without a major overhaul. “People should be aware of this vulnerability and how to prevent its exploitation, and not hide it in the dark.”

The researcher said that Apple recently updated iOS in an effort to limit the problem. The patch limits the number of characters in Device name, but it doesn't prevent attackers from running an earlier version that allows very long emails to the device and then forces someone to accept it, even if it's the last recipient.Run the iOS version, the device will be completely locked down.

Continue reading iMessage zero-day is being used to hack the iPhones of 36 journalists.It is relatively tameable with no-click exploits that often allow attackers to run malicious code on iPhones, but if Apple wants to encourage users to trust, With their iOS devices, they really need to fix the bug. They didn't respond to emails asking for comment for this article.


https://safirsoft.com Why doesn't Apple Touch return an ID to iPhone?

Why doesn't Apple Touch return an ID to iPhone?

When Apple unveiled the iPhone X in 2017, users faced a major change. Not only was the home button no longer available, but other users could no longe...


https://safirsoft.com Another Chinese company wants to supply old iPhone panels

Another Chinese company wants to supply old iPhone panels

Currently, Samsung and LG supply most of the old panels of various iPhone models, but it seems that Apple intends to supply these panels from more com...

https://safirsoft.com Lightroom vs. Photoshop; Which one should we choose to edit the images?

Lightroom vs. Photoshop; Which one should we choose to edit the images?

To start comparing Lightroom and Photoshop We should have an overview of the features of each of these softwares. Photoshop was released in 1990 as a ...


https://safirsoft.com A new report on the cause of the global chip crisis has been released; There is no news of improvement

A new report on the cause of the global chip crisis has been released; There is no news of improvement

You've probably heard about the global chip crisis in recent months. You may have heard a lot about this, but recently there was a new piece of news t...