Apple has stopped signing iPhones for iOS 15.2 verification. Users can’t downgrade to iOS 15.2 after the upgrade to iOS 15.2.1. Apple has been imposing a new system on iPhone users for a while. Reports earlier today claimed that Apple would stop updating iOS 14 to push iOS 15. Apple claims that the decision to allow users to continue using iOS 14 was temporary.
Regardless of whether Apple closes the iOS 15.2 verification channel or stops updating iOS 14, the goal is to make sure that all users upgrade to the new system. A recent study shows that iOS 15’s upgrade rate is lower than iOS 13 and iOS 14. The iOS 15 shares has been 57% over four years. iOS 14’s four-year share of installs stands at 81%. iOS 13 had a 77% install rate. It is clear that iOS 15 performs worse in terms of installing than iOS 13 or iOS 14.
iOS 15 bugs such as unstable battery life and automatic brightness failure are responsible for the lower upgrade rate. Many users are reluctant to try the new system because of these issues. There is a bug in iOS 15.2.1. User feedback has been received. Keyboard number keys, delete keys, and other keys don’t display correctly. Many users are reluctant to upgrade because the operation is stuck after an upgrade.
IOS 15.2 DEVICES ARE VULNERABLE TO HOMEKIT DOORLOCK ISSUE
Apple HomeKit is now facing a new potential problem. This issue directly affects iOS 14.7 and iOS 15.2. This issue is known as “doorlock”, a persistent denial-of-service vulnerability. The issue was discovered on Apple HomeKit. This software framework allows iPhone and iPad users to control smart home appliances from their phones.
Trevor Spiniolas, a security researcher, has publicly disclosed details about this vulnerability. He stated that Apple knew about the flaw from August 10, 2021. The company has not addressed the problem for nearly five months. The researcher claims that despite repeated promises to resolve it, the issue remains unresolved. An attacker could change the HomeKit device’s name to include more than 500,000 characters in order to trigger “doorlock.”
Spinolas released an iOS app that shows a proof of concept exploit. It can access Home data and change HomeKit device names, even if the target user doesn’t have any HomeKit devices.