[ad_1]
Apple has launched yet one more spherical of safety patches to deal with three actively exploited zero-day flaws impacting iOS, iPadOS, macOS, watchOS, and Safari, taking the full tally of zero-day bugs found in its software program this yr to 16.
The listing of safety vulnerabilities is as follows –
- CVE-2023-41991 – A certificates validation challenge within the Safety framework that might permit a malicious app to bypass signature validation.
- CVE-2023-41992 – A safety flaw in Kernel that might permit an area attacker to raise their privileges.
- CVE-2023-41993 – A WebKit flaw that might lead to arbitrary code execution when processing specifically crafted internet content material.
Apple didn’t present further specifics barring an acknowledgement that the “challenge could have been actively exploited in opposition to variations of iOS earlier than iOS 16.7.”
The updates can be found for the next units and working methods –
- iOS 16.7 and iPadOS 16.7 – iPhone 8 and later, iPad Professional (all fashions), iPad Air third technology and later, iPad fifth technology and later, and iPad mini fifth technology and later
- iOS 17.0.1 and iPadOS 17.0.1 – iPhone XS and later, iPad Professional 12.9-inch 2nd technology and later, iPad Professional 10.5-inch, iPad Professional 11-inch 1st technology and later, iPad Air third technology and later, iPad sixth technology and later, iPad mini fifth technology and later
- macOS Monterey 12.7 and macOS Ventura 13.6
- watchOS 9.6.3 and watchOS 10.0.1 – Apple Watch Collection 4 and later
- Safari 16.6.1 – macOS Large Sur and macOS Monterey
Credited with discovering and reporting the shortcomings are Invoice Marczak of the Citizen Lab on the College of Toronto’s Munk Faculty and Maddie Stone of Google’s Menace Evaluation Group (TAG), indicating that they might have been abused as a part of highly-targeted spyware and adware aimed toward civil society members who’re at heightened danger of cyber threats.
The disclosure comes two weeks after Apple resolved two different actively exploited zero-days (CVE-2023-41061 and CVE-2023-41064) which have been chained as a part of a zero-click iMessage exploit chain named BLASTPASS to deploy a mercenary spyware and adware referred to as Pegasus.
This was adopted by each Google and Mozilla delivery fixes to include a safety flaw (CVE-2023-4863) that might lead to arbitrary code execution when processing a specifically crafted picture.
AI vs. AI: Harnessing AI Defenses In opposition to AI-Powered Dangers
Able to sort out new AI-driven cybersecurity challenges? Be a part of our insightful webinar with Zscaler to deal with the rising risk of generative AI in cybersecurity.
There’s proof to recommend that each CVE-2023-41064, a buffer overflow vulnerability within the Apple’s Picture I/O picture parsing framework, and CVE-2023-4863, a heap buffer overflow within the WebP picture library (libwebp), may check with the identical bug, in response to Isosceles founder and former Google Mission Zero researcher Ben Hawkes.
Rezilion, in an evaluation printed Thursday, revealed that the libwebp library is utilized in a number of working methods, software program packages, Linux functions, and container pictures, highlighting that the scope of the vulnerability is way broader than initially assumed.
“The excellent news is that the bug appears to be patched accurately within the upstream libwebp, and that patch is making its option to in every single place it ought to go,” Hawkes stated. “The dangerous information is that libwebp is utilized in a number of locations, and it may very well be some time till the patch reaches saturation.”
[ad_2]