A recent vulnerability in a popular login system in Apple’s iOS app for iPhones and iPads has allowed hackers to hijack an iPhone login prompt for more than 100,000 accounts, including those for law enforcement, the military and government agencies.
The exploit, which Apple released in August, has since been patched.
But the issue has continued to plague Apple, which has been scrambling to fix the vulnerability since late last month.
Security researchers have noted that the vulnerability only affects iOS versions 5.1.3 and earlier, not later versions, which would make it impossible to exploit.
The latest flaw was discovered by security researcher Dan Shull, who posted a detailed exploit for the exploit on Twitter.
The exploit works by exploiting a vulnerability in Apple QuickTime Player, which is a software component that is often used by app developers to automate the creation of animations and effects for the various user interfaces.
“I found a bug in AppleQuickTime Player that allows attackers to hijacking login prompt prompts, even if the system is turned off,” Shull wrote.
“Once the user opens the login prompt, it looks like an iOS login prompt with the new password: the password is not ‘123456.’”
This is an exploit for a bug that Apple fixed in iOS 5.2, and it’s an example of a bug exploited by the latest exploit.
The vulnerability was already known by Apple, but Shull exploited it to take control of an iPhone.
Shull said the exploit only works when the user is logged into the app with a valid email address.
That email address was only used to sign up for a login prompt and not to create a new account.
Shull’s exploit allows a hacker to send a specially crafted email to the user’s iCloud email address, forcing the iPhone to accept the invitation.
Shul noted that this is the second time the bug has been exploited.
He also said that the exploit works in Safari, as well.
ShULL said that while Apple has yet to make any announcements about fixing the vulnerability, the company has been making the process of patching the issue a priority.
“We’re making significant progress on this and have deployed a fix for this issue in Safari and have also been working to deploy a fix in the iPhone X,” Apple spokesman Michael Zagaris said in an email.
Apple released iOS 5 as an open-source software, meaning it’s free to use for everyone.
The company has also released an operating system update that fixes some of the security issues found in iOS 6.3.
But Shull said that security updates only cover the vulnerabilities that Apple fixes in its software.
Apple’s vulnerability is the latest in a series of recent attacks that have targeted Apple products, and has caused a major backlash in the security community.
Apple released a fix last week for the security hole, but it only addressed the vulnerabilities in Safari.
Apple did not immediately respond to a request for comment.
Security researcher Jonathan Zdziarski, who discovered the vulnerability and has since released an exploit, said he is now working on a new exploit that will exploit other security flaws in the Apple iOS software.
He wrote on Twitter that the new exploit will “bring the full potential of the iPhone’s iPhone 6 security into the iOS 7.”
Apple has not yet responded to a question about whether it will make a fix available for the iPhone 6s or iPhone 6.
It has been known that the iPhone 5s has the same vulnerability, although Zdziski said he has not found evidence of it in the software.