Article Details
Scrape Timestamp (UTC): 2024-05-13 21:51:01.361
Original Article Text
Click to Toggle View
Apple backports fix for RTKit iOS zero-day to older iPhones. Apple has backported security patches released in March to older iPhones and iPads, fixing an iOS Kernel zero-day tagged as exploited in attacks. In security advisories published today, Apple once again said they're aware of reports that this vulnerability "may have been actively exploited." The flaw is a memory corruption issue in Apple's RTKit real-time operating system that enables attackers with arbitrary kernel read and write capability to bypass kernel memory protections. The company has not yet attributed the discovery of this security vulnerability to a security researcher. On March 5th, the company addressed the zero-day vulnerability (tracked as CVE-2024-23296) for newer iPhone, iPad, and Mac models. Today, Apple backported the March security updates to address this security flaw on iOS 16.7.8, iPadOS 16.7.8, and macOS Ventura 13.6.7 with improved input validation. The list of devices patched today includes iPhone 8, iPhone 8 Plus, iPhone X, iPad 5th generation, iPad Pro 9.7-inch, and iPad Pro 12.9-inch 1st generation. Three zero-days exploited in attacks patched in 2024 Apple has yet to disclose who disclosed the zero-day or whether it was discovered internally, and it has provided no information on the nature of the attacks exploiting it in the wild. Even though Apple has not released details regarding CVE-2024-23296 exploitation, iOS zero-days are commonly used in state-sponsored spyware attacks targeting high-risk individuals, including journalists, dissidents, and opposition politicians. While this zero-day was likely only used in targeted attacks, it is highly advised to install today's security updates as soon as possible to block potential attack attempts if you're using an older iPhone or iPad model. Since the start of the year, Apple has fixed three zero-days: two in March (CVE-2024-23225 and CVE-2024-23296) and one in January (CVE-2024-23222). In January, Apple also backported patches for two WebKit zero-days (CVE-2023-42916 and CVE-2023-42917), which were patched in November for newer devices. With today's iOS 17.5 update, Apple has also added support for unwanted tracking alerts (Google launched the same capability on Android 6.0+ devices). These alerts will warn users if Bluetooth tracking devices (AirTag, Find My accessory, or other industry specification-compatible Bluetooth tracker) are being used to track their location.
Daily Brief Summary
Apple has updated older iPhone and iPad models with security patches to address an exploited iOS Kernel zero-day vulnerability (CVE-2024-23296).
The zero-day is a memory corruption issue within Apple's RTKit OS, giving attackers expansive kernel access to bypass memory protections.
Originally fixed in March for newer devices, the patches are now backported to models including iPhone 8, iPhone X, and certain iPad generations.
Although explicit details of the attacks using this vulnerability are undisclosed, such zero-days are often leveraged in state-sponsored espionage against high-risk individuals.
Users of older devices are urged to update immediately to prevent potential exploits.
In total, Apple has addressed three zero-days so far in 2024, with additional WebKit vulnerabilities patched earlier in the year.
The latest iOS update also introduces alerts to inform users of potentially unwanted Bluetooth device tracking.