Attack PC via USB Connection
With escalated privileges, an adversary could program the mobile device to impersonate USB devices such as input devices (keyboard and mouse), storage devices, and/or networking devices in order to attack a physically connected PC This technique has been demonstrated on Android. We are unaware of any demonstrations on iOS.
|Use Recent OS Version|
|User Guidance||Advise users to only connect mobile devices to PCs when a justified need exists (e.g., mobile app development and debugging).|