New Restricted Mode USB mode on iOS 11.4.1 appears a serious security vulnerability
Recently released iOS 11.4.1 with Restricted Mode security feature that allows data access on iPhone via Lightning port after the device has been unlocked for more than an hour. But according to a new discovery by a security company called ElcomSoft, this new security feature is not really as secure as we think.
Recently released iOS 11.4.1 with Restricted Mode security feature that allows data access on iPhone via Lightning port after the device has been unlocked for more than an hour. But according to a new discovery by a security company called ElcomSoft, this new security feature is not really as secure as we think.
Accordingly, the company has discovered a serious security vulnerability on this new feature. Specifically, the last 60-minute countdown timer from the iPhone unlock will reset from the beginning if within a 1-hour period a USB port accessory is plugged into the device. There are many accessories, including first-party accessories made by Apple, that can do this.
In addition, the history connected to the newly plugged accessory is also ignored by the iPhone. During the test, the researchers found that the hacking technique overtook the iPhone even when using an adapter that converted the camera's Lightning to USB 3 port. However, the Lightning converter cable to 3.5mm audio port does not work. Currently, they are continuing to experiment with more adapters.
According to expert Oleg Afonin, in case the law enforcement agency confiscates the device at the time the new owner unlocks, they can immediately connect the phone to a compatible USB accessory to prevent Restricted Mode USB activation. And they will have 60 minutes to access iPhone via Lightning port since that time to hack the passcode to unlock the device.
The expert also added that Apple will soon discover an error that can delay Restricted Mode with a simple manual method and fix it immediately. 'Apples' introduce their new security features to help protect users' private information to the highest level so they won't be able to survive such a primitive vulnerability. Before iOS 12 launched, Apple had plenty of time to research and refine its security features.
Currently, Apple still has no response to this incident.
See more:
- The $ 5 million supercar is capable of hacking iPhone and Android smartphones from a distance of 500 meters
- The former Apple engineer claims to be able to unlock all iPhones for $ 15,000
- Apple denies that iPhone can be brute force to open passwords easily
- AMD CPUs also have security vulnerabilities that have existed for many years now!
- How to restrict viewers to post on Facebook
- The new Specter vulnerability appears to be a new variant that easily 'crashes' secure partitions created by Intel SGX
- Serious vulnerability in Microsoft Word is being used by hackers to install malware on computers
- How to enable sensitive, violent video restriction on YouTube
- Now it is possible to hack Windows with Google Chrome