Security Experts:

Connect with us

Hi, what are you looking for?


Mobile & Wireless

AirDoS: Hackers Can Block iPhones, iPads Via AirDrop Attack

One of the vulnerabilities addressed this week by Apple can be exploited to make iPhones and iPads unusable by getting them to continuously display a popup message.

One of the vulnerabilities addressed this week by Apple can be exploited to make iPhones and iPads unusable by getting them to continuously display a popup message.

The denial-of-service (DoS) attack was discovered by researcher Kishan Bagaria, who dubbed the method AirDoS because it relies on AirDrop.

AirDrop allows iPhone, iPad, Mac and iPod users to share photos, documents and other types of files with nearby devices via Bluetooth or Wi-Fi.

Bagaria discovered that an attacker can use the AirDoS attack to “infinitely spam” all nearby iPhones and iPads with an AirDrop popup. The dialog box will keep appearing on the screen regardless of how many times the user presses the Accept or Decline buttons. The attack will continue even after the user locks and unlocks the device.

The attack works against all devices that have set AirDrop to accept files from “Everyone.” If AirDrop is set to “Contacts Only,” the attacker will need to be in the victim’s contact list for the AirDoS attack to work.

Bagaria told SecurityWeek that the AirDoS attack works against macOS devices as well, but the impact is less severe as the AirDrop dialog box does not block the user interface, and users can easily block the attack by disabling Wi-Fi or Bluetooth.

Attacks can also be stopped by getting out of the range of the attacking device. On iOS and iPadOS, users can stop an attack by disabling Bluetooth and Wi-Fi via Siri or the Control Center, if it’s enabled. Attacks can be prevented by ensuring that AirDrop is not configured to allow files from anyone.

Apple has not assigned a CVE identifier to this flaw, but it has credited Bagaria in its advisories. Apple addressed the issue in iOS 13.3, iPadOS 13.3 and macOS 10.15.2. In the case of iOS and iPadOS — and possibly also in the case of macOS — Apple implemented a rate limiting mechanism, and if a user declines three requests from a device, the operating systems will automatically decline all subsequent requests from that device.

Bagaria has published a proof-of-concept (PoC) exploit and a video showing how the attack works.

Related: iOS Vulnerabilities Allowed Attackers to Remotely Hack iPhones for Years

Related: Operation Indiscriminately Infects iPhones With Spyware

Related: Apple Says Security Report on iPhone Hack Created ‘False Impression’

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.

Mobile & Wireless

The February 2023 security updates for Android patch 40 vulnerabilities, including multiple high-severity escalation of privilege bugs.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.

Mobile & Wireless

South Dakota Gov. Kristi Noem says her personal cell phone was hacked and linked it to the release of documents by the January 6...

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...