• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
TechEngage

TechEngage®

Technology Reviews, Guides & Analysis

  • Cryptocurrency
  • Science
    • Energy
    • Environment
    • Health
    • Space
  • Apps
  • More
    • Opinion
    • Noteworthy
    • Culture
    • Events
    • Deals
    • Startups
      • Startup Submissions
  • Videos
  • Tools
TechEngage » Phones

iPhone X is reportedly vulnerable to hacks!

Avatar for Nouman S Ghumman Nouman S Ghumman Follow Nouman S Ghumman on Twitter Updated: December 29, 2018

IPhone X
Via Unsplash
FacebookTweetPinLinkedInPrintEmail

Just as Masas found a vulnerability in Facebook and got rewarded, the Fluoroacetate duo, Richard Zhu and Amat Cama earned $50,000 for finding a hack on iPhone X!

The Fluoroacetate duo found a hack that allowed them to catch a photo that was deleted from the device!

During a Pwn2Own contest in Tokyo, where hackers performed to locate bugs in iOS and Android, two hackers who teamed up as “Fluoroacetate” discovered a vulnerability in the iPhone X. Apple was informed of the bug as soon as the duo traced the scenario and demonstrated it. The duo found this bug on the latest iOS (12.1) and reported it according to the Pwn2Own rules.
The hack retrieved a photo that was deleted from the cell phone.
However, the image was accessed from the recently deleted folder. This recently deleted folder was accessed through a third party interaction which in the case mentioned above, was a malicious Wi-Fi access point. As per the Forbes report, the hack was capable of retrieving a lot more information than just a deleted image.
If we consider the iPhone X functionality, any picture that you delete prompts a message that tells that the picture would be deleted from both, the device and the iCloud storage. As soon as you proceed with “Delete,” the photo is deleted from the parent folder but remains in a recently deleted folder for about 30 days. This is the case if you have an iCloud storage. Otherwise, the picture is immediately deleted from both the parent folder as well as the recently deleted items.

Confirmed! The @fluoroacetate duo combined a bug in JIT with an Out-Of-Bounds Access to exfiltrate data from the iPhone. In the demo, they grabbed a previously deleted photo. In doing so, they earn themselves $50K and 8 Master of Pwn points. #P2OTokyo

— TrendAI Zero Day Initiative (@thezdi) November 14, 2018


However, the duo found a way to access this recently deleted folder due to the vulnerability in the Just-in-time compiler used in iPhone. The Just-in-time compiler processes code as the program runs, which increases the device’s performance. It was learned that due to this vulnerability in the compiler any malicious, remote actor can access the information on the device. The Fluoroacetate duo used an image to demonstrate this scenario during the contest.
The bug is expected to resolve by the next update. Until then, the iPhone X remains vulnerable to attacks from malicious access points.
Wait for Apple’s next update. Until then, stay tuned!

Published: November 15, 2018 Updated: December 29, 2018

Filed Under: Phones, Security Tagged With: Apple, iPhone X, news

Related Stories

  • Samsung Galaxy Note 7 Review

    Samsung Galaxy Note 7 Review

  • Samsung Galaxy S7 Review

    Samsung Galaxy S7 Review

  • The Synesthesia Mask

    The Synesthesia Mask

FacebookTweetPinLinkedInPrintEmail
Avatar for Nouman S Ghumman

Nouman S Ghumman

VP & Associate General Counsel

Nouman S Ghumman serves as Vice President and Associate General Counsel at TechEngage. He holds an LLM in International Commercial Law from City, University of London and is a Managing Partner at SG Advocates and Legal Consultants. Nouman contributes expert analysis on smartphones, cybersecurity, internet regulation, and the legal dimensions of technology across nearly 80 articles.

Joined December 2009

Reader Interactions

Share Your Thoughts Cancel reply

Please read our comment policy before submitting your comment. Your email address will not be used or published anywhere. You will only receive comment notifications if you opt to subscribe below.

Primary Sidebar

TechEngage-Apple-News TechEngage-Google-News

Recent Stories

  • The Complete History of the Internet: From ARPANET to AI (Visual Timeline)
  • The 10 Best-Selling Cars of All Time [Infographic]
  • Best Gaming Graphics Cards (GPUs): 8 Picks From Budget to Enthusiast
  • Best Long-Range Outdoor WiFi Extenders: 8 Tested Picks for Reliable Coverage
  • Best AM Radios for Long-Distance Reception: 10 Tested Picks

Footer

Discover

  • About TechEngage
  • Newsroom
  • Our Team
  • Advertise
  • Send us a tip
  • Startup Submission Questionnaire
  • Brand Kit
  • Contact us

Legal pages

  • Reviews Guarantee & Methodology
  • Community Guidelines
  • Corrections Policy and Practice
  • Cookies Policy
  • Our Ethics
  • Disclaimer
  • GDPR Compliance
  • Privacy Policy
  • Terms and Conditions

Must reads

  • Best AirPods alternatives on Amazon
  • Best PC monitors for gaming on Amazon
  • Best family board games
  • Best video doorbells without subscription
  • Best handheld video game consoles
  • Best all-season tires for snow
  • Best mobile Wi-Fi hotspots
  • Best treadmills on Amazon

Download our apps

TechEngage app coming soon on App Store

© 2026 TechEngage®. All Rights Reserved. TechEngage® is a project of TechAbout LLC.

TechEngage® is a registered trademark in the United States under Trademark Number 6823709 and in the United Kingdom under Trademark Number UK00003417167. It is also ISSN protected under ISSN 2690-3776 and has OCLC Number 1139335774.