April 27, 2015 By Douglas Bonderud 2 min read

Despite stiff competition from other mobile manufacturers, Apple still rules the roost. According to CNN, the company posted its best-ever quarter in the latter part of 2014, selling almost 75 million iPhones in just three months. However, all these devices make for tempting targets. Mobile security firm Skycure has uncovered an iOS 8 vulnerability that leverages fake wireless hot spots and compromised Secure Sockets Layer (SSL) certificates to create a “no iOS zone.”

Stung by SSL?

Using SSL certificates is an industry-standard best practice; almost every app for sale on iTunes uses SSL as a matter of course. According to a recent Skycure blog post, however, Chief Technology Officer Yair Amit and his team uncovered a bug in the certificates being pushed to their Apple devices.

It started when they bought and configured a new wireless router and then noticed apps on iPhones in the room began to crash. After some digging, the security firm found that by using specially crafted SSL certificates, it was possible to create a bug that let attackers crash any SSL-dependent app on command.

What’s more, prolonged use of the device caused iOS to crash, as well. Under certain circumstances, the Skycure team found they could also put the phone into a constant reboot cycle, preventing users from fixing the problem. Of course, this iOS 8 vulnerability depends on a Wi-Fi connection; it’s not possible to manipulate SSL certificates in this way over cellular networks.

Who Watches the Wi-Fi?

Of course, users that rely on cellular connections were unaffected since this SSL-based iOS 8 vulnerability is only exploitable across Wi-Fi connections. However, as noted by CSO Online, that’s no guarantee of safety since many mobile carriers preconfigure smartphones to automatically connect if they’re in range of subscriber networks. To simplify this process, networks have a very limited name set. For instance, in the United Kingdom, devices using Vodafone’s infrastructure will automatically connect to networks named “1WifiVodafone1x” or “Auto-BTWifi.” What’s more, users can’t turn off this feature without completely disabling their Wi-Fi.

This naming scheme makes it easy for cybercriminals to uncover the most common network handles. Using the WiFiGate technique, also discovered by Skycure, attackers could set up a fake network that devices would automatically detect and access. Then, modified SSL certificates could knock out iOS devices and make them unusable. At the coffee shop or restaurant level, this threat amounts to little more than a minor inconvenience, but if deployed in an area that sees heavy mobile use for business — such as Wall Street or Silicon Valley — this iOS 8 vulnerability could become a large-scale distributed denial-of-service attack.

So far, there is no fix for the SSL/WiFiGate flaw, but Skycure is working with Apple to resolve the problem and is keeping mum about some of the more pertinent technical details. No attacks have been reported, but it’s a sobering reminder that secure and familiar doesn’t always mean safe and sound.

Image Source: iStock

More from

Why do software vendors have such deep access into customer systems?

4 min read - To the naked eye, organizations are independent entities trying to make their individual mark on the world. But that was never the reality. Companies rely on other businesses to stay up and running. A grocery store needs its food suppliers; a tech company relies on the business making semiconductors and hardware. No one can go it alone.Today, the software supply chain interconnects companies across a wide range of industries. Software applications and operating systems depend on segments of the software…

How CTEM is providing better cybersecurity resilience for organizations

4 min read - Organizations today continuously face a number of fast-moving cyber threats that regularly challenge the effectiveness of their cybersecurity defenses. However, to keep pace, businesses need a proactive and adaptive approach to their security planning and execution.Cyber threat exposure management (CTEM) is an effective way to achieve this goal. It provides organizations with a reliable framework for identifying, assessing and mitigating new cyber risks as they materialize.The importance of developing cybersecurity resilienceRegardless of the industry, all organizations are subject to certain…

Insights from CISA’s red team findings and the evolution of EDR

3 min read - A recent CISA red team assessment of a United States critical infrastructure organization revealed systemic vulnerabilities in modern cybersecurity. Among the most pressing issues was a heavy reliance on endpoint detection and response (EDR) solutions, paired with a lack of network-level protections. These findings underscore a familiar challenge: Why do organizations place so much trust in EDR alone, and what must change to address its shortcomings? EDR’s double-edged sword A cornerstone of cyber resilience strategy, EDR solutions are prized for…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today