Enlarge / A proof-of-concept that exploits WebKit vulnerabilities on Nintendo’s Switch. (credit: qwertyoruiop)
Nintendo’s Switch has been out for almost two weeks, which of course means that efforts to hack it are well underway. One developer, who goes by qwertyoruiop on Twitter, has demonstrated that the console ships with months-old bugs in its WebKit browser engine.
These bugs allow for arbitrary code execution within the browser.
A proof-of-concept explainer video was posted here.
These bugs attracted attention last year because they were used to hijack an iPhone used by a political dissident in the United Arab Emirates; the bugs could allow attackers to steal call histories, texts, contacts and calendar information, and messages from apps like Gmail and WhatsApp.
The trio of bugs, collectively known as “Trident,” were disclosed after Apple patched them in iOS 9.3.5 in August of 2016.
The potential impact of these vulnerabilities for Switch users is low.
A Switch isn’t going to have the same amount of sensitive data on it that an iPhone or iPad can, and there are way fewer Switches out there than iDevices. Right now, the Switch also doesn’t include a standalone Internet browser, though WebKit is present on the system for logging into public Wi-Fi hotspots, and, with some cajoling, you can use it to browse your Facebook feed.
Read 2 remaining paragraphs