Article 5T0FH Researchers trigger new exploit by renaming an iPhone and a Tesla

Researchers trigger new exploit by renaming an iPhone and a Tesla

by
Corin Faife
from The Verge on (#5T0FH)
acastro_170629_1777_0008.0.jpg Illustration by Alex Castro / The Verge

Security researchers investigating the recently discovered and extremely bad" Log4Shell exploit claim to have used it on devices as varied as iPhones and Tesla cars. Per screenshots shared online, changing the device name of an iPhone or Tesla to a special exploit string was enough to trigger a ping from Apple or Tesla servers, indicating that the server at the other end was vulnerable to Log4Shell.

In the demonstrations, researchers switched the device names to be a string of characters that would send servers to a testing URL, exploiting the behavior enabled by the vulnerability. After the name was changed, incoming traffic showed URL requests from IP addresses belonging to Apple and, in the case of Tesla, China Unicom - the company's...

Continue reading...

External Content
Source RSS or Atom Feed
Feed Location http://www.theverge.com/rss/index.xml
Feed Title The Verge
Feed Link https://www.theverge.com/
Reply 0 comments