Article Details
Scrape Timestamp (UTC): 2023-12-11 19:28:53.248
Original Article Text
Click to Toggle View
Apple emergency updates fix recent zero-days on older iPhones. Apple has issued emergency security updates to backport patches for two actively exploited zero-day flaws to older iPhones and some Apple Watch and Apple TV models. "Apple is aware of a report that this issue may have been exploited against versions of iOS before iOS 16.7.1," the company said in security advisories published on Monday. The two vulnerabilities, now tracked as CVE-2023-42916 and CVE-2023-42917, were discovered within the WebKit browser engine, developed by Apple and used by the company's Safari web browser across its platforms (e.g., macOS, iOS, iPadOS). They can let attackers obtain access to sensitive data through and execute arbitrary code using maliciously crafted webpages designed to exploit out-of-bounds and memory corruption bugs on unpatched devices. Today, Apple addressed the zero-days in iOS 16.7.3, iPadOS 16.7.3, tvOS 17.2, and watchOS 10.2 with improved input validation and locking. The company says the bugs are now also patched on the following list of devices: Clément Lecigne, a security researcher from Google's Threat Analysis Group (TAG), discovered and reported both zero-day vulnerabilities. Although Apple has yet to provide details about the vulnerabilities' exploitation in attacks, researchers at Google TAG have frequently identified and disclosed information on zero-day flaws employed in state-sponsored surveillance software attacks targeting high-profile individuals, including journalists, opposition figures, and dissidents. CISA also ordered Federal Civilian Executive Branch (FCEB) agencies last week, on December 4, to patch their devices against these two security vulnerabilities based on evidence of active exploitation. Since the start of the year, Apple has patched 20 zero-day vulnerabilities exploited in attacks:
Daily Brief Summary
Apple has released emergency security updates to address two zero-day vulnerabilities that have been exploited in the wild.
The flaws, known as CVE-2023-42916 and CVE-2023-42917, affect older iPhone models, some Apple Watches, and Apple TV units.
These vulnerabilities exist within the WebKit browser engine, risking sensitive data exposure and allowing for arbitrary code execution via malicious web pages.
Enhanced input validation and improved memory handling have been implemented in iOS 16.7.3, iPadOS 16.7.3, tvOS 17.2, and watchOS 10.2 to counteract these security issues.
Google’s Threat Analysis Group (TAG) security researcher Clément Lecigne discovered and reported these critical security breaches.
Although specific details on the exploitation incidents haven't been disclosed by Apple, such vulnerabilities are often used in high-profile state-sponsored cyber-espionage.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) mandated Federal Civilian Executive Branch (FCEB) agencies to patch against these threats due to evidence of active exploitation.
Apple has addressed a total of 20 zero-day vulnerabilities that have been used in cyberattacks since the beginning of the year.