Topics

Latest

AI

Amazon

Article image

Image Credits:David Paul Morris/Bloomberg / Getty Images

Apps

Biotech & Health

Climate

Pedestrians pass in front of a billboard advertising Apple Inc. iPhone security during the 2019 Consumer Electronics Show (CES) in Las Vegas.

Image Credits:David Paul Morris/Bloomberg / Getty Images

Cloud Computing

commercialism

Crypto

enterprisingness

EVs

Fintech

Fundraising

Gadgets

stake

Google

Government & Policy

ironware

Instagram

Layoffs

Media & Entertainment

Meta

Microsoft

Privacy

Robotics

Security

Social

Space

Startups

TikTok

Transportation

Venture

More from TechCrunch

Events

Startup Battlefield

StrictlyVC

Podcasts

picture

Partner Content

TechCrunch Brand Studio

Crunchboard

Contact Us

Apple has fixed a years - old exposure in its iPhone and iPad software that cave a privateness feature film since it first debut .

Back in 2020 , Apple announce a new feature in iOS 14 that would prevent nearby wireless routers and access points from gathering an Apple gimmick ’s unique MAC reference .

Tracking MAC addresses can have legitimate use , like allowing administrators to identify every gimmick connected to their networks , such as unauthorised equipment . But knowing a gadget ’s MAC addresses can beused for trackingthat gadget across different networks .

Rather than sharing the equipment ’s unparalleled MAC address , the iOS feature of speech would use a different “ private savoir-faire ” for each connection .

But it turns out that this feature film has n’t work out as intended since it was first present , according to security investigator Tommy Mysk and Talal Haj Bakry , who discovered a flaw that prevent the privacy feature from properly working .

In a video published this calendar week , Mysk explained that while iOS has replaced the twist ’s tangible MAC address with a randomly mother reference for each net , the twist ’s software also included the real MAC address in the AirPlay find requests that an iPhone sends when it joins a internet . These veridical MAC addresses were then propagate to every other affiliated gimmick on the connection .

Join us at TechCrunch Sessions: AI

Exhibit at TechCrunch Sessions: AI

“ There is no way to forbid iPhones and iPads from sending AirPlay discovery requests , even when connected to a VPN , ” Mysk say . “ Apple ’s devices do this to find AirPlay - capable devices in the web . ”

Mysk corroborate to TechCrunch that iPhones and iPads hold open send these request even when the drug user enabledLockdown Mode , an opt - in characteristic designed to protect against highly place cyberattacks .

Mysk said he first discovered this issue in July , and submitted a security account to Apple on July 25 . Mysk told TechCrunch that communication with Apple furnish a “ major obstruction , ” saying that the tech giant star was unable to replicate the “ straight ” yield until October 3 , when he was notified that a fix was uncommitted to be tested .

Apple this week desexualize the exposure , dog asCVE-2023 - 42846 , with the release of iOS 17.1 and iOS 16.7.2 for previous devices that can run away iOS 16 . As Mysk note , machine run iOS 14 or iOS 15 persist vulnerable .

Apple has not disclosed the severity of the bug , but Mysk notes that the exposure evaluation sexual conquest organisation classify the vulnerability as “ gamy . ”

Apple spokesperson Scott Radcliffe decline to reply TechCrunch ’s question .

Apple this week restore several other vulnerabilities with iOS 17.1 , including a flaw that may have allow an assailant to access passkeys without authentication , and a Siri hemipteran that could have exposed sensitive data to a hacker with physical memory access to a machine .

iOS 17 include these new certificate and privacy features