April 27, 2015 By Douglas Bonderud 2 min read

Despite stiff competition from other mobile manufacturers, Apple still rules the roost. According to CNN, the company posted its best-ever quarter in the latter part of 2014, selling almost 75 million iPhones in just three months. However, all these devices make for tempting targets. Mobile security firm Skycure has uncovered an iOS 8 vulnerability that leverages fake wireless hot spots and compromised Secure Sockets Layer (SSL) certificates to create a “no iOS zone.”

Stung by SSL?

Using SSL certificates is an industry-standard best practice; almost every app for sale on iTunes uses SSL as a matter of course. According to a recent Skycure blog post, however, Chief Technology Officer Yair Amit and his team uncovered a bug in the certificates being pushed to their Apple devices.

It started when they bought and configured a new wireless router and then noticed apps on iPhones in the room began to crash. After some digging, the security firm found that by using specially crafted SSL certificates, it was possible to create a bug that let attackers crash any SSL-dependent app on command.

What’s more, prolonged use of the device caused iOS to crash, as well. Under certain circumstances, the Skycure team found they could also put the phone into a constant reboot cycle, preventing users from fixing the problem. Of course, this iOS 8 vulnerability depends on a Wi-Fi connection; it’s not possible to manipulate SSL certificates in this way over cellular networks.

Who Watches the Wi-Fi?

Of course, users that rely on cellular connections were unaffected since this SSL-based iOS 8 vulnerability is only exploitable across Wi-Fi connections. However, as noted by CSO Online, that’s no guarantee of safety since many mobile carriers preconfigure smartphones to automatically connect if they’re in range of subscriber networks. To simplify this process, networks have a very limited name set. For instance, in the United Kingdom, devices using Vodafone’s infrastructure will automatically connect to networks named “1WifiVodafone1x” or “Auto-BTWifi.” What’s more, users can’t turn off this feature without completely disabling their Wi-Fi.

This naming scheme makes it easy for cybercriminals to uncover the most common network handles. Using the WiFiGate technique, also discovered by Skycure, attackers could set up a fake network that devices would automatically detect and access. Then, modified SSL certificates could knock out iOS devices and make them unusable. At the coffee shop or restaurant level, this threat amounts to little more than a minor inconvenience, but if deployed in an area that sees heavy mobile use for business — such as Wall Street or Silicon Valley — this iOS 8 vulnerability could become a large-scale distributed denial-of-service attack.

So far, there is no fix for the SSL/WiFiGate flaw, but Skycure is working with Apple to resolve the problem and is keeping mum about some of the more pertinent technical details. No attacks have been reported, but it’s a sobering reminder that secure and familiar doesn’t always mean safe and sound.

Image Source: iStock

More from

FYSA — VMware Critical Vulnerabilities Patched

< 1 min read - SummaryBroadcom has released a security bulletin, VMSA-2025-0004, addressing and remediating three vulnerabilities that, if exploited, could lead to system compromise. Products affected include vCenter Server, vRealize Operations Manager, and vCloud Director.Threat TopographyThreat Type: Critical VulnerabilitiesIndustry: VirtualizationGeolocation: GlobalOverviewX-Force Incident Command is monitoring activity surrounding Broadcom’s Security Bulletin (VMSA-2025-0004) for three potentially critical vulnerabilities in VMware products. These vulnerabilities, identified as CVE-2025-22224, CVE-2025-22225, and CVE-2025-22226, have reportedly been exploited in attacks. X-Force has not been able to validate those claims. The vulnerabilities…

SoaPy: Stealthy enumeration of Active Directory environments through ADWS

10 min read - Introduction Over time, both targeted and large-scale enumeration of Active Directory (AD) environments have become increasingly detected due to modern defensive solutions. During our internship at X-Force Red this past summer, we noticed FalconForce’s SOAPHound was becoming popular for enumerating Active Directory environments. This tool brought a new perspective to Active Directory enumeration by performing collection via Active Directory Web Services (ADWS) instead of directly through Lightweight Directory Access Protocol (LDAP) as other AD enumeration tools had in the past.…

Smoltalk: RCE in open source agents

26 min read - Big shoutout to Hugging Face and the smolagents team for their cooperation and quick turnaround for a fix! Introduction Recently, I have been working on a side project to automate some pentest reconnaissance with AI agents. Just after I started this project, Hugging Face announced the release of smolagents, a lightweight framework for building AI agents that implements the methodology described in the ReAct paper, emphasizing reasoning through iterative decision-making. Interestingly, smolagents enables agents to reason and act by generating…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today