SMS vulnerability could allow text spoofing on iOS devices

SMS vulnerability could allow text spoofing on iOS devices

pod2g has just published a blog regarding an SMS vulnerability he's found in iOS that could allow someone to abuse the protocol for SMS in order to spoof or send fake text messages. The exploit has been an issue since the incarnation of iOS and is still present in iOS 6 beta 4.

He's now urging Apple to fix it.

He goes on to explain a bit about the protocol that is used to send SMS messages, PDU (Protocol Description Unit), and how it works.

PDU is a protocol that is pretty dense, allowing different types of messages to be emitted. Some examples : SMS, Flash SMS, Voice mail alerts, EMS, ... The specification is large and pretty complex. As an example, just to code the data, there are multiple possible choices : 7bit, 8bit, UCS2 (16bit), compressed or not, ...

The problem is that if you own a smartphone or a modem you have the ability to send messages in this raw type of format. There's also an optional section, UDH (User Data Header), that not all smartphones are compatible with but that allows more advanced features to be sent in a message. Some of these "more advanced features" include changing the reply-to address or sending the message from a different number altogether. The iPhone does support these features and contains a vulnerability that makes it susceptible to attacks by hackers that may choose to abuse this system.

pod2g lays out a few ways in which hackers could take advantage of this exploit:

  • pirates could send a message that seems to come from the bank of the receiver asking for some private information, or inviting them to go to a dedicated website. [Phishing]
  • one could send a spoofed message to your device and use it as a false evidence.
  • anything you can imagine that could be utilized to manipulate people, letting them trust somebody or some organization texted them.

There are tools already available that make it rather simple to manipulate this data on smartphones. He's also created a tool for the iPhone 4 that he also plans on releasing. He is currently urging Apple to fix the issue before the public release of iOS 6 and warns that you should never trust an SMS message containing sensitive data on your iPhone in the time being.

Do you think releasing the tool will get Apple's attention or just cause more issues in the mean time for end users?

Source: pod2g

Have something to say about this story? Leave a comment! Need help with something else? Ask in our forums!

Allyson Kazmucha

Senior editor for iMore. I can take apart an iPhone in less than 6 minutes. I also like coffee and Harry Potter more than anyone really should.

More Posts



← Previously

LogMeIn Ignition vs. Screens vs. iTeleport: VNC apps for iPad shootout!

Next up →

AT&T will require you to be on a Mobile Share plan to use FaceTime over cellular

Reader comments

SMS vulnerability could allow text spoofing on iOS devices


Anybody that would send sensitive, personal information in an SMS reply is not practicing the best in protection and data security. Never send sensitive info over SMS - if anybody needs that info, give it to them over the phone, or best - in person.

So true. Never send sensitive information in any kind of electronic mail system. The only reason these types of scams work, is because people will still give out sensitive information. I had the bank call me about a problem. I asked for the persons name, and extension. I advised him, I would call him back. I then called the number on the back of my credit card, and finally got a live person, then got the fraud agent that called me. Never trust anything.