Jump to content

iOS Wi-Fi vulnerability leaves devices without Wi-Fi functionality

BondiBlue
31 minutes ago, StDragon said:

In response to both @Jet_ski @BondiBlue; I'm reading conflicting info online elsewhere to that same reasoning. Some say it just has to read the SSID once in range while others state you must explicitly attempt to connect to it.

At this point I will err on the side of caution and just disable WiFi within the iOS Settings Menu until Apple provides an iOS update.

Hmm would be good to get some clarification around that, hope it's actually trying to connect that causes it and not simply being in range.

Link to comment
Share on other sites

Link to post
Share on other sites

6 hours ago, leadeater said:

Hmm would be good to get some clarification around that, hope it's actually trying to connect that causes it and not simply being in range.

Yea clarification would help...hoping someone has an iPhone here and can check (a spare iPhone).

 

I think the confusion is around the fact that a few weeks ago there was a similar thing where you had to join a network, but then there was a tweet regarding hosting a public wifi with a different string.  Specifically this one

 

But in the thread there seems to be discussion that it's a bit finicky (not all iPhones are susceptible).

3735928559 - Beware of the dead beef

Link to comment
Share on other sites

Link to post
Share on other sites

On 7/6/2021 at 9:20 AM, leadeater said:

Hmm would be good to get some clarification around that, hope it's actually trying to connect that causes it and not simply being in range.

Okay, from what I've seen/heard of this now.  It isn't about simply being in range.  If they have their iPhones set to auto-join networks then they could be in trouble (depending which version of phone they are running).

 

Although, I don't use iPhone enough, is auto-join public wifi networks on by default or do users have to turn it on?  (I'd imagine it is off, but I could be wrong).

 

The potential attack being that someone sets up an unprotected hotspot with that name, and people join it [manually or automatically] (and since it's saved in the backup, you have to use a backup prior to being exposed)/

3735928559 - Beware of the dead beef

Link to comment
Share on other sites

Link to post
Share on other sites

7 hours ago, wanderingfool2 said:

Okay, from what I've seen/heard of this now.  It isn't about simply being in range.  If they have their iPhones set to auto-join networks then they could be in trouble (depending which version of phone they are running).

 

Although, I don't use iPhone enough, is auto-join public wifi networks on by default or do users have to turn it on?  (I'd imagine it is off, but I could be wrong).

 

The potential attack being that someone sets up an unprotected hotspot with that name, and people join it [manually or automatically] (and since it's saved in the backup, you have to use a backup prior to being exposed)/

It's off by default, but is set to notify user about open nearby networks. I just want to know who are people that connect to random bizarre named WiFi networks and managed to survive this long without any incidents.

Link to comment
Share on other sites

Link to post
Share on other sites

1 hour ago, RejZoR said:

It's off by default, but is set to notify user about open nearby networks. I just want to know who are people that connect to random bizarre named WiFi networks and managed to survive this long without any incidents.

Children 🙄. I could see such a scenario where they are playing on an iPad and that pops up on the screen. Of course they will tap on it 😒

Link to comment
Share on other sites

Link to post
Share on other sites

24 minutes ago, StDragon said:

Children 🙄. I could see such a scenario where they are playing on an iPad and that pops up on the screen. Of course they will tap on it 😒

iirc it doens't just directly connect you, it just takes you to WiFi settings and then you decide. Still, yeah, some people just click/tap anything.

Link to comment
Share on other sites

Link to post
Share on other sites

I still hear the legend of my coworkers sending the text of death to my other coworkers and constantly bricking their phones.

Workstation:  14700nonK || Asus Z790 ProArt Creator || MSI Gaming Trio 4090 Shunt || Crucial Pro Overclocking 32GB @ 5600 || Corsair AX1600i@240V || whole-house loop.

LANRig/GuestGamingBox: 13700K @ Stock || MSI Z690 DDR4 || ASUS TUF 3090 650W shunt || Corsair SF600 || CPU+GPU watercooled 280 rad pull only || whole-house loop.

Server Router (Untangle): 13600k @ Stock || ASRock Z690 ITX || All 10Gbe || 2x8GB 3200 || PicoPSU 150W 24pin + AX1200i on CPU|| whole-house loop

Server Compute/Storage: 10850K @ 5.1Ghz || Gigabyte Z490 Ultra || EVGA FTW3 3090 1000W || LSI 9280i-24 port || 4TB Samsung 860 Evo, 5x10TB Seagate Enterprise Raid 6, 4x8TB Seagate Archive Backup ||  whole-house loop.

Laptop: HP Elitebook 840 G8 (Intel 1185G7) + 3060 RTX Thunderbolt Dock, Razer Blade Stealth 13" 2017 (Intel 8550U)

Link to comment
Share on other sites

Link to post
Share on other sites

On 7/4/2021 at 1:32 PM, BondiBlue said:

The device does not need to connect to the network; it simply needs to be in range. A hard reset seems to be required to fix the devices, so users would have to use cellular data or USB to backup their data. 

Even if they come in range and even if they connect, can't they just move out of range of the network and it will be fixed?

  • My system specs
  • View 91 Tempered Glass RGB Edition, No PSU, XL-ATX, Black, Full Tower Case
  • ROG MAXIMUS XI EXTREME, Intel Z390 Chipset, LGA 1151, HDMI, E-ATX Motherboard
  • Core™ i9-9900K 8-Core 3.6 - 5.0GHz Turbo, LGA 1151, 95W TDP, Processor
  • GeForce RTX™ 2080 Ti OC ROG-STRIX-RTX2080TI-O11G-GAMING, 1350 - 1665MHz, 11GB GDDR6, Graphics Card
  • ROG RYUJIN 360, 360mm Radiator, Liquid Cooling System
  • 32GB Kit (2 x 16GB) Trident Z DDR4 3200MHz, CL14, Silver-Red DIMM Memory
  • AX1600i Digital, 80 PLUS Titanium 1600W, Fanless Mode, Fully Modular, ATX Power Supply
  • Formula 7, 4g, 8.3 (W/m-K), Nano Diamond, Thermal Compound
  • On AIO cooler 6 x NF-F12 IPPC 3000 PWM 120x120x25mm 4Pin Fibre-glass SSO2 Heptaperf Retail
  • 6 x NF-A14 IPPC-3000 PWM 140mm, 3000 RPM, 158.5 CFM, 41.3 dBA, Cooling Fan
  • 1TB 970 PRO 2280, 3500 / 2700 MB/s, V-NAND 2-bit MLC, PCIe 3.0 x4 NVMe, M.2 SSD
  • Windows 10 Pro 64-bit 
  • Beyerdynamic MMX 300 (2nd Generation) Premium Gaming Headset
  • ROG PG279Q
  • Corsair K95 Platinum XT
  • ROG Sica
Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×