HomeCII/OTApple Vision Pro Bug Can Be Exploited To Generate 3D Objects

Apple Vision Pro Bug Can Be Exploited To Generate 3D Objects

Published on

spot_img

The recent discovery of a vulnerability in the Apple Vision Pro headset has raised concerns about the security of spatial computing devices. The vulnerability, known as CVE-2024-27812, allowed hackers to bypass the device’s security mechanisms and flood users’ environments with animated 3D objects, such as spiders and bugs, through a Safari exploit. These objects persisted even after users exited Safari, creating a uniquely unsettling experience.

Security researcher Ryan Pickren disclosed the vulnerability to Apple in February, and the company addressed it this month, awarding Pickren a bounty for his findings. The bug underscored the challenges in securing spatial computing devices, which rely on immersive technologies to create virtual environments for users.

Apple designed the Vision Pro headset with strict privacy controls, limiting device apps to a default ‘Shared Space’ and requiring explicit user consent for more engaging content. However, Pickren discovered that the AR Quick Look feature, introduced in 2018 for iOS, remained active in the visionOS without proper safeguards. This oversight allowed malicious websites to manipulate HTML anchor tags to spawn unlimited 3D objects with animations and spatial audio.

By adding specific anchor tags to webpages, hackers could instruct Safari to render 3D models without user interaction, leading to scenarios where rooms were filled with crawling spiders and screeching bats. Even closing Safari did not remove the 3D objects, as they were handled by a separate application, Quick Look, requiring users to manually tap each object to remove them from their environment.

When trying to disclose the flaw to Apple, Pickren felt that the company downplayed the vulnerability’s significance in spatial computing and 3D object generation, focusing instead on potential system crashes and reboots. The CVE description suggested that the issue was addressed by improving file handling protocols, a response that Pickren believed did not fully address the root cause of the bug. This discrepancy highlighted the challenges of identifying and categorizing vulnerabilities in emerging fields like Spatial Computing.

Pickren emphasized that the impact of the bug extended beyond system crashes, prompting a reevaluation of the security and privacy implications of the technology. He called for Apple to reassess its threat model for the Vision Pro headset, considering the product’s personal nature and the limitations of traditional vulnerability assessment guidelines in capturing the full impact of such exploits.

The incident serves as a reminder of the continuous efforts needed to safeguard emerging technologies and underscores the importance of thorough vulnerability assessment and response strategies. As spatial computing devices become more prevalent, addressing security risks proactively will be crucial to ensuring a safe and immersive user experience.

Source link

Latest articles

LeakBase Marketplace Shut Down by Law Enforcement in 14 Countries

US-Led International Crackdown on the LeakBase Cyberforum: A Significant Step in the Fight Against...

How SMBs Leverage Threat Research and MDR to Enhance Their Defensive Edge

The Growing Importance of Managed Detection and Response (MDR) in Cybersecurity In today's digital landscape,...

Tech Giants and Washington Unite for Anthropic in Pentagon Dispute

Lawmakers and Industry Voices Express Concerns Over Pentagon's Supply-Chain Risk Label In a growing debacle...

Comparison of Five Leading Next-Generation Firewall Vendors

Next-Generation Firewalls: A Comprehensive Evaluation In the evolving landscape of cyber threats, next-generation firewalls (NGFWs)...

More like this

LeakBase Marketplace Shut Down by Law Enforcement in 14 Countries

US-Led International Crackdown on the LeakBase Cyberforum: A Significant Step in the Fight Against...

How SMBs Leverage Threat Research and MDR to Enhance Their Defensive Edge

The Growing Importance of Managed Detection and Response (MDR) in Cybersecurity In today's digital landscape,...

Tech Giants and Washington Unite for Anthropic in Pentagon Dispute

Lawmakers and Industry Voices Express Concerns Over Pentagon's Supply-Chain Risk Label In a growing debacle...