Blog Layout

New iOS Update Provides Fix For HomeKit Brick Issue

sccomputerguys • Jan 25, 2022

If you have an iPhone by now you've almost certainly heard of the security flaw in the HomeKit protocol which allows Apple users to discover and control a wide range of Smart Devices in their home from the HomeKit dashboard. The recently discovered security flaw dubbed "DoorLock" allows an attacker to essentially brick your phone by deploying a maliciously crafted HomeKit accessory name.  The issue is being tracked as CVE-2022022588.

Apple has now addressed the issue with the release of iOS 15.2.1 and iPadOS 15.2.1. Both updates improve input validation with the result that the devices are no longer susceptible.

That's the good news.  Trevor Spiniolas is the researcher who first discovered the flaw and he gives us the bad news. The company has known about it since August of 2021, and it has taken months for them to issue a fix for it.  During that time Apple said very little about the issue while exposing their user base to unnecessary risk.

Spinolas had this to say about the matter:

"I believe this bug is being handled inappropriately as it poses a serious risk to users and many months have passed without a comprehensive fix.  The public should be aware of this vulnerability and how to prevent it from being exploited, rather than being kept in the dark."

We agree.  It does appear that where the DoorLock issue is concerned, Apple dropped the ball.  The company is normally much better at handling and responding to issues like these.  Here's hoping they take Spinolas' criticism in the spirit in which it was intended and strive to do better when the next issue inevitably rears its head.

If you own an Apple device and if you use HomeKit be sure to check your iOS or iPadOS version.  If you're running anything prior to 15.2.1 upgrade right away to mitigate your risk.

By sccomputerguys 22 Jul, 2022
Do you own one or more of the following products made by Cisco? The RV110W Wireless-N VPN Firewall The RV130 VPN Router The RV130W Wireless-N Multifunction VPN Router The RV215W Wireless-N VPN ...
By sccomputerguys 21 Jul, 2022
Do you use Microsoft Teams?  If so, you'll be thrilled to know that the Redmond Giant is continuing to pour resources into improving the software with a specific focus on audio and ...
By sccomputerguys 20 Jul, 2022
Corporate branding can be worth its weight in gold and certain images are absolutely iconic.  The Golden Arches, the Nike "swoosh," and Apple's Apple all come to mind. Logo images give companies ...
By sccomputerguys 19 Jul, 2022
Remember the Heartbleed scare we had a couple years back?  It was a nasty side-channel attack that was somewhat exotic and difficult to pull off, and it was absolutely devastating and sent ...
By sccomputerguys 18 Jul, 2022
Microsoft Exchange servers are once more in the crosshairs of hackers around the world.  Most recently, hacking groups have been specifically targeting them to deploy BlackCat ransomware. As is common among ransomware ...
By sccomputerguys 16 Jul, 2022
If you grew up in the days before the internet, it's absolutely staggering to think of all the ways that mobile technology has changed our lives (and mostly for the better). Remember ...
By sccomputerguys 15 Jul, 2022
It may seem as though Internet Explorer is the browser that will not die, but according to Microsoft, it is now a step closer to breathing its last virtual breath. Microsoft has ...
By sccomputerguys 14 Jul, 2022
If you're involved with IT Security at any level and if your network includes Linux servers, keep a watchful eye out for the new Panchan botnet. It first appeared in the wilds ...
By sccomputerguys 13 Jul, 2022
These days, companies spend significant sums of money to protect themselves from cyber criminals.  The threat matrix is vast, and attacks can come from almost any quarter. That is why many companies ...
By sccomputerguys 12 Jul, 2022
Do you receive healthcare of any kind from Kaiser Permanente?  If so, be aware that they recently published a data breach notification indicating that an unidentified attacker accessed an email account that ...
More Posts
Share by: