In a swift move to bolster cybersecurity defenses, Apple has swiftly responded to emerging threats by rolling out vital security updates to tackle several vulnerabilities, including two actively exploited flaws detected in the wild.
The identified vulnerabilities are as follows:
- CVE-2024-23225: A memory corruption glitch found in the Kernel, enabling attackers with arbitrary kernel read and write capabilities to circumvent kernel memory protections.
- CVE-2024-23296: Another memory corruption issue, this time in the RTKit real-time operating system (RTOS), permitting attackers with arbitrary kernel read and write abilities to bypass kernel memory protections.
Though the precise exploitation methods of these vulnerabilities remain undisclosed, Apple has taken proactive measures to mitigate the risks. The company has promptly addressed both vulnerabilities by implementing enhanced validation in iOS 17.4, iPadOS 17.4, iOS 16.7.6, and iPadOS 16.7.6.
Cybersecurity experts emphasize the critical nature of these updates, underscoring the importance of swift action to safeguard devices from potential threats.
These crucial updates are now available for a wide range of devices:
- iOS 16.7.6 and iPadOS 16.7.6: Compatible with iPhone 8, iPhone 8 Plus, iPhone X, iPad 5th generation, iPad Pro 9.7-inch, and iPad Pro 12.9-inch 1st generation.
- iOS 17.4 and iPadOS 17.4: Designed for iPhone XS and later, iPad Pro 12.9-inch 2nd generation and later, iPad Pro 10.5-inch, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 6th generation and later, and iPad mini 5th generation and later.
This recent development marks Apple’s swift response to actively exploited zero-day vulnerabilities. Earlier this year, Apple proactively addressed another zero-day threat in late January 2024. The vulnerability, a type confusion flaw in WebKit (CVE-2024-23222), affected multiple Apple platforms including iOS, iPadOS, macOS, tvOS, and Safari web browser, posing a risk of arbitrary code execution.
This latest effort underscores Apple’s commitment to prioritizing user security and staying ahead of emerging threats.
In parallel, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities (KEV) catalog, urging federal agencies to swiftly implement necessary updates by March 26, 2024.
The highlighted vulnerabilities include:
- CVE-2023-21237: An information disclosure flaw impacting Android Pixel devices.
- CVE-2021-36380: An operating system command injection flaw in Sunhillo SureLine, potentially leading to code execution with root privileges.
Google, in a June 2023 advisory, acknowledged indications of limited, targeted exploitation of CVE-2023-21237. Additionally, Fortinet revealed late last year that a Mirai botnet named IZ1H9 was leveraging CVE-2021-36380 to orchestrate susceptible devices into a DDoS botnet.
These developments underscore the collaborative effort among tech giants, security agencies, and cybersecurity experts to combat emerging threats and protect users from potential harm. As the digital landscape continues to evolve, proactive measures and swift responses are paramount in ensuring the safety and security of all users. Stay informed, stay secure.
Pingback: Google Meet, Zoom, Skype Impersonation. Stay vigilant