A Google security researcher has published proof-of-concept code for a vulnerability that can be exploited remotely via a WiFi connection to take over iPhone 7 handsets.
"The exploit gains code execution on the Wi-Fi firmware on the iPhone 7," says Gal Beniamini, a member of the Google Project Zero security team.
"Upon successful execution of the exploit, a backdoor is inserted into the firmware, allowing remote read/write commands to be issued to the firmware via crafted action frames, thus allowing easy remote control over the Wi-Fi chip," Beniamini says.
The exploit works remotely, no user interaction needed, and can be used to target any user attempting to connect to a rogue WiFi network.
While the demo code works on iPhone 7 devices, the vulnerability at the heart of the issue affects a broad range of products, such Android handsets, smart TVs running tvOS, and other devices with Broadcom WiFi chips.
Beniamini said the bug — tracked as CVE-2017-11120 — affects Broadcom WiFi chips running firmware version BCM4355C0, and all devices where these WiFi chips and firmware are deployed. Beniamini discovered a similar Broadcom bug in April this year.
The issue is similar to Broadpwn, another vulnerability that affected Broadcom WiFi chipsets and that came to light over the summer.
Broadpwn works similarly to Beniamini's bug by allowing an attacker to execute code on remote devices without any interaction needed from the user.