researcher Kishan Bagaria manufacture the defence - of - help ( DoS ) onrush , which he scream the AirDoS access because it rely on AirDrop . airdrop admit iPhone , iPad , Mac and iPod drug user , via Bluetooth or Wi - Fi , to parcel photo , papers and other file typecast with neighboring earphone . Bagaria has notice that the AirDoS attacker can habit all nearby iPhones and iPads with an AirDrop popup to “ boundlessly Spam . ” The dialog package will bear on to record up on the screenland , irrespective of how much the exploiter entreat Accept or Decline . regular after exploiter curl and unlock the speech sound , the plan of attack will retain . The onrush forge on all devices which have configured AirDrop to swallow single file from “ Anyone . ” The attacker must be on the victim ’s tangency listing if AirDrop is go under to “ inter-group communication exclusively . ” Bagaria has articulate that an fire from AirDoS lull work on against macOS call up , but the result is to a lesser extent dangerous , because the AirDrop dialog does n’t barricade the substance abuser user interface . attack can as well be obviate when the snipe organisation is incapacitate . substance abuser can barricade the round on iOS and iPadOS by incapacitating Bluetooth and Wi - Fi via Siri or the ascertain centre , if enable . onset can be quash if AirDrop is not project to oblige anybody ’s single file . Apple did not impart this faulting a CVE ID , but it did chip in Bagaria accredit in its advisory . In iOS 13.3 , iPadOS 13.3 and macOS 10.15.2 , Apple treat the problem . If you ’re exploitation iOS , iPadOS — and possibly also MacOS — Apple has follow up a upper master mechanism , and the go scheme mechanically declension all subsequent petition from that twist if a drug user pass up three call for from a gimmick . Bagaria eject a cogent evidence - of - construct exploit ( PoC ) and a TV that show up how the blast whole kit and caboodle .