
The security vulnerability in passwords application was closed with iOS 18.2
Nowadays, most modern websites allow unpotted HTTP connections, but automatically direct them to HTTPS using 301 redirects. Before the iOS 18.2 update, the Passwords application also directed requests from HTTP to HTTPS. Under normal circumstances, it can be thought that this is not a problem because password changes occur on a encrypted page and the identity information is not sent as straight text. However, when the attacker is connected to the same network (ie Starbucks, Airport or Hotel Wi-Fi) and blocks the first HTTP request before guiding. It is possible to manipulate traffic in several ways. How to take place in the video:
Apple closed this security vulnerability with the iOS 18.2 and iPados 18.2 update in December, but the Apple Security Updates page has just mentioned that there was such a security vulnerability.