Apple Fails to Sanitize Phone Number Field for Lost AirTags

October 1, 2021

Security expert Bobby Rauch has publicly disclosed a vulnerability in Apple’s AirTags which gives attackers the privilege to drop a maliciously prepared AirTag.

According to Rauch, Apple’s AirTag is not able to sanitize user input, because while an attacker only needs to enter valid XSS in the field of the AirTag phone number, put the AirTag into Lost Mode and place it in a location where the target can find it, scanning a lost AirTag allows the website “Found. apple.com” to embed the contents of the phone number field in the website as it appears in the victim’s browser.

For Rauch, one prominent way to exploit the vulnerability is to open a fake iCloud login dialog on the victim’s phone with a simple XSS.

As soon as the website embeds the XXS in the response for a scanned AirTag, the victim receives a pop-up window displaying the contents of badside.tld/page.html which could be a zero-day exploit.

While Rauch first reported the vulnerability to Apple and asked when it would be fixed, the company has been saying for three months that it is investigating the issue that led Rauch to make the vulnerability public.

For more information, read the original story in Arstechnica.

Top Stories

Related Articles

December 30, 2025 A fast-moving cyberattack has compromised more than 59,000 internet-facing Next.js servers in less than two days after more...

December 29, 2025 The U.S. National Institute of Standards and Technology (NIST) has warned that several of its Internet Time more...

December 29, 2025 A critical security flaw has been found in LangChain, one of the most widely used frameworks for more...

December 23, 2025 South Korea will require facial recognition scans to open new mobile phone accounts. The new rule is more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn