Apple can Request Remote Access to the Device [ Privacy Research ]
Hello everyone,
My name is Ismail Tasdelen. As a security researcher. I have found that Apple can remotely access all of its products.
I
gave my mom the old apple iphone 5s model phone to use. And this device
is not connected to icloud. No icloud sessions are active. Let’s start
talking.
Step by step:
{ https://developer.apple.com/account/
}In order to search for the vulnerability I wanted to access this site,
then came the notification sound from the next room. My mother received
a confirmation request on her phone. This is very strange because I’ve
format the phone and icloud accounts were not active.
Mom phone [iPhone5s] Screenshot :
- We log in from the login panel below with your Apple ID.
2. I have 2-step verification as follows. He wants a six-digit verification code from us.
3. We are entering the 6 digit verification code from the notification phone. And we continue to admit it.
If
I didn’t have the phone. There is a second option. I can receive a
verification request through a phone number defined in my Apple ID.
{*} The biggest problem here is that not although the apple ID is defined, the apple can access this device.
Notes: This is not exactly a security vulnerability. But I think Apple company can provide remote access to devices.
This is the end of my blog! Thank you for taking the time to read (: