The cyber security buff Ian Beer explained on Wednesday, that the vulnerability, which has been patched by iPhone, gave attackers access to the entire device over Wi-Fi without any interaction from the user.
Meanwhile, Beer came across the iPhone bug earlier this year within the iOS "kernel", a layer of code that forms the foundations of the operating system.That means the vulnerability was active for years until Apple patched it in May.
Beer added: ''an attacker would simply need to have been connected to the same WiFi network as you to break into your device unnoticed.''
During the attack the hacker could view all photos, copy of private messages, emails and monitor everything which happens there in real-time. Beer further found through his exploits that the buffer overflow bug was found in a driver for Apple’s native mesh networking protocol, AWDL. With the bug, a hacker can get complete access remotely as the driver for AWDL exists in the kernel.
On other hand, the cyber security expert at the Manchester University Prof Daniel Dresner, explained that how new services could be exploited, as devices become more connected.As phones seem to be the pivot point of always-on online living.
Noteworthy, Apple sold between 1.7 million and 2 million iPhone 12 units during the phone’s first day of preorders on October 16, according to Apple’s analyst ”Ming-Chi Kuo” . According to Kuo, China has the most demand for the new version since the country’s 5G networks are more widely available than they are in other countries.