Apple Vision Pro ‘Bug’ Allows for Creation of 3D Objects

Published:

spot_img

Apple Vision Pro Vulnerability Allows Hackers to Flood Environments with 3D Objects

A recent security vulnerability in the Apple Vision Pro headset has left users startled as hackers were able to flood their environments with animated 3D objects, such as spiders and bugs, through a Safari exploit. The objects persisted even after exiting the browser, creating a uniquely unsettling experience for users.

Security researcher Ryan Pickren discovered the flaw (CVE-2024-27812) in February and disclosed it to Apple, who addressed the issue this month and awarded Pickren a bounty. The bug exposed the challenges in securing ‘spatial computing’ devices like the Vision Pro.

Apple had implemented strict privacy controls in the Vision Pro, including limiting apps to a default ‘Shared Space’ and requiring explicit user consent for immersive content. However, the AR Quick Look feature introduced in 2018 for iOS remained active in the visionOS without proper safeguards, allowing malicious websites to spawn unlimited 3D objects without user interaction.

Pickren explained that by adding specific anchor tags to webpages, hackers could fill a user’s room with crawling spiders and screeching bats without their knowledge. The exploit code is straightforward, and even closing Safari doesn’t remove the 3D objects, as they are handled by a separate application.

The researcher emphasized the need for Apple to reevaluate their threat model for the Vision Pro, as the bug’s impact goes beyond system crashes or reboots. This incident highlights the challenges in triaging and classifying vulnerabilities in emerging fields like Spatial Computing, raising concerns about security and privacy in technology.

spot_img

Related articles

Recent articles

Active Exploits Reported in “Fixed” FortiOS 7.4.9 Firmware by Fortinet Admins

Understanding the Recent Fortinet Single Sign-On Vulnerability: CVE-2025-59718 Network security is an ever-evolving field, and vulnerabilities can emerge even in systems presumed secure. Recently, administrators...

Malicious PyPI Package Masquerades as SymPy to Install XMRig Miner on Linux Systems

Malicious Python Package Found in PyPI: A New Cryptojacking Threat Overview of the Threat A newly identified malicious package in the Python Package Index (PyPI) is...

Ingram Micro Data Breach: Ransomware Attack Impacts 42,000+ Individuals

Ingram Micro Data Breach: Insights into the Cybersecurity Incident In recent news, Ingram Micro, one of the leading distributors of IT products globally, has confirmed...

1 in 10 UK Businesses Worry They Can’t Survive a Major Cyberattack

Escalating Cyber Threats Facing UK Businesses UK businesses are confronted with an alarming rise in cyber threats, according to a recent survey by Vodafone Business....