Solely a few weeks after the preliminary iPhone Wi-Fi bug was discovered, the identical safety researcher Carl Schou has discovered one other comparable concern.
Schou tweeted at present that if an iPhone is available in vary of a Wi-Fi community named ‘%secretclubpercentpower’, then that iPhone will now not be capable of use Wi-Fi or Wi-Fi associated options. Schuo even says that this bug persists when resetting community settings.
It appears the one workaround for this explicit concern could be a tough manufacturing facility reset of the machine. 9to5Mac didn’t independently check this, nor will we suggest others strive.
The sooner concern relied on the iPhone encountering a community identify with the SSiD “%ppercentspercentspercentspercentspercentn” and the person trying to hook up with it. Nevertheless, that bug was fixable by resetting iPhone community settings within the Settings app. This new downside seems extra extreme as it could actually set off as quickly because the iPhone is available in vary of a malicious public Wi-Fi hotspot utilizing that poisoned identify.
Clearly, the underlying bugs are associated as each ‘%secretclubpercentpower’ and ‘%ppercentspercentspercentspercentspercentn’ exploit a string format coding error someplace within the underlying iOS networking stack.
At this level, it appears seemingly that there are various extra variants of bug-inducing community names that use the ‘%s’, ‘%p’ and ‘%n’ character sequences. You possibly can learn our earlier protection for a guess at what is likely to be taking place behind the scenes right here.
From the angle of a person person, one of the best security precaution is to easily keep away from connecting to Wi-Fi networks that include p.c symbols of their identify. Then look ahead to the inevitable software program replace the place Apple will repair the OS bug that’s inflicting the denial of service.
FTC: We use revenue incomes auto affiliate hyperlinks. Extra.