mirror of
https://github.com/JGoyd/iOS-Activation-Flaw.git
synced 2026-02-12 21:12:48 +00:00
Update README.md
This commit is contained in:
committed by
GitHub
parent
0e572bc184
commit
ae72c39f37
@@ -36,3 +36,9 @@ The flaw permits arbitrary provisioning changes without authentication, signatur
|
||||
|
||||
- 05/19/2025 reported to Apple & US Cert (tracking ID VRF#25-05-RCKYK)
|
||||
- Vendor unresponsive as of 09/23/2025
|
||||
|
||||
---
|
||||
|
||||
## Why It Matters
|
||||
|
||||
If activation can be hijacked, no iPhone is safe from day one. A silent attacker could pre-configure networks, tokens, or carrier rules before the user ever sees the home screen. Trust in Apple’s entire supply chain depends on this step being secure.
|
||||
|
||||
Reference in New Issue
Block a user