Hackers could take control of an iPhone if its owner visits a doctored Web site or Internet hotspot, security researchers reported Monday.
The vulnerability of the vaunted device, Apple Inc.'s (AAPL) first cell phone, is only theoretical for now. There are no reports of criminals actually taking advantage of the security glitch to remotely access an iPhone.
But if it were exploited, hijacked iPhones could be very useful to the same gangs that take over personal computers and use them to disseminate spam, said Charlie Miller, principal security analyst at Independent Security Evaluators, which discovered the flaw.
"You could have a million iPhones dialing the company's main line and overwhelm it that way," Miller said.
In addition, hijacked iPhones could be used to send spam by cell-phone text message, which computers generally can't. Any personal data on the phones, such as private phone numbers and text messages, would be accessible as well.
• Click here to visit FOXNews.com's Cybersecurity Center.
• Click here for FOXNews.com's Personal Technology Center.
The flaw applies not only to the iPhone, which was launched just three weeks ago, but also to Apple computers running Mac OS X and the company's Safari Web browser, a version of which comes with the iPhone.
It does not affect Safari running on Microsoft Corp.'s (MSFT) Windows systems.
The researchers at Baltimore-based ISE haven't released the specifics of the vulnerability to the public, but have provided details to Apple and supplied the company with a patch, a software update for plugging the hole.
On Aug. 2, Miller will present details of the flaw at the Black Hat USA hacker conference in Las Vegas and online. That will make it easier for criminals to replicate the exploit, but he stressed that it should also be easy for Apple to release a patch to all its users before then.
The iPhone and Macintosh computers are configured to receive software updates automatically from Apple.
"Hopefully, on Aug. 2, nothing happens: we release the information, everyone's patched and that's it," Miller said.
Apple spokeswoman Lynn Fox said Apple is looking into ISE's report, but would not say if there are plans for a patch.
"We always welcome feedback on our security," Fox said.
Miller said the flaw did not necessarily reflect badly on Apple.
"I'm sure that if you put any sort of mobile device that's complex enough in front of me, we'd find pretty much the same thing," he said.
At the same time, "the security of the iPhone is not as good as the security of the Mac desktop, and I think that's something they need to work on."
Miller and the rest of the ISE team, which included Jake Honoroff and Joshua Mason, discovered holes in the security of the iPhone within minutes of getting their hands on their boss' phone.
"He didn't really want to let us do it, but eventually he gave in, and we poked around with it for a few minutes, and already saw some things that could make the programs crash," Miller said.
Their technique, called "fuzzing," involves sending lots of random or improperly formatted data to a device, and noting what causes crashes or other problems that could be openings to sending code that takes over the device.
To protect an iPhone against this and similar future vulnerabilities, the ISE team recommends that users only visit sites they trust, not open Web sites from e-mails and not use unfamiliar Wi-Fi hotspots.