Apple can Request Remote Access to the Device [ Privacy Research ]

Hello everyone,
My name is Ismail Tasdelen. As a security researcher. I have found that Apple can remotely access all of its products.
I gave my mom the old apple iphone 5s model phone to use. And this device is not connected to icloud. No icloud sessions are active. Let’s start talking.
Step by step:
{ https://developer.apple.com/account/ }In order to search for the vulnerability I wanted to access this site, then came the notification sound from the next room. My mother received a confirmation request on her phone. This is very strange because I’ve format the phone and icloud accounts were not active.
Mom phone [iPhone5s] Screenshot :



As this device shows, the icloud session is not active.
  1. We log in from the login panel below with your Apple ID.

login panel page
2. I have 2-step verification as follows. He wants a six-digit verification code from us.

verification page
3. We are entering the 6 digit verification code from the notification phone. And we continue to admit it.
If I didn’t have the phone. There is a second option. I can receive a verification request through a phone number defined in my Apple ID.
{*} The biggest problem here is that not although the apple ID is defined, the apple can access this device.

as we have seen, we have successfully passed the verification phase.

{ https://developer.apple.com/account/#/welcome} web application user dashboard page
Notes: This is not exactly a security vulnerability. But I think Apple company can provide remote access to devices.
This is the end of my blog! Thank you for taking the time to read (:

Bu blogdaki popüler yayınlar

Windows LNK File Analysis in Forensic System Reviews

SQL Injection Payload List