HomeSample Page

Sample Page Title


Apple recommends customers replace to iOS 17.1.2, iPadOS 17.1.2 and macOS 14.1.2. Google’s Risk Evaluation Group found these safety bugs.

Apple has patched two zero-day vulnerabilities affecting iOS, iPadOS and macOS; customers are suggested to replace to iOS 17.1.2, iPadOS 17.1.2 and macOS 14.1.2. The vulnerabilities have been found by Google’s Risk Evaluation group, which has been engaged on fixes for lively Chrome vulnerabilities this week as effectively.

Soar to:

What are these Apple OS vulnerabilities?

“Apple is conscious of a report that this situation might have been exploited in opposition to variations of iOS earlier than iOS 16.7.1,” in keeping with Apple’s put up concerning the safety updates on Nov. 30. This suggests that attackers could also be actively utilizing the vulnerabilities.

Apple’s replace mentioned the issue originated in WebKit, the engine used for Apple’s browsers, the place “processing net content material might result in arbitrary code execution.” The updates repair an out-of-bounds learn by means of improved enter validation and restore a reminiscence corruption vulnerability utilizing improved locking.

SEE: Attackers have launched eavesdropping assaults on Apple units during the last yr. (TechRepublic) 

The primary vulnerability, the out-of-bounds learn, is tracked as CVE-2023-42916. The replace addressing it’s accessible for:

  • iPhone XS and later.
  • iPad Professional 12.9-inch 2nd era and later.
  • iPad Professional 10.5-inch.
  • iPad Professional 11-inch 1st era and later.
  • iPad Air third era and later.
  • iPad sixth era and later.
  • iPad mini fifth era and later.

The second vulnerability, the reminiscence corruption, is tracked as CVE-2023-42917. The replace addressing it’s accessible for:

  • iPhone XS and later.
  • iPad Professional 12.9-inch 2nd era and later.
  • iPad Professional 10.5-inch.
  • iPad Professional 11-inch 1st era and later.
  • iPad Air third era and later.
  • iPad sixth era and later.
  • iPad mini fifth era and later.

Data is sparse concerning the vulnerabilities, which Apple mentioned have been investigated by Clément Lecigne at Google’s Risk Evaluation Group; the group’s said mission is to “counter government-backed assaults.”

Remediation and safety in opposition to the WebKit exploits

Apple customers ought to make sure they’re operating the most recent model of their working system, as a basic safety greatest apply in addition to within the case of lively vulnerabilities equivalent to these. Apple has offered a whole checklist of probably the most up-to-date software program updates.

A busy week for the Google Risk Evaluation Group

The Google Risk Evaluation Group additionally noticed and stuck an out of bounds reminiscence entry and 6 different vulnerabilities in Google Chrome earlier this week. On Nov. 28, Google introduced a Chrome replace to handle the next:

  • Kind Confusion in Spellcheck.
  • Use after free in Mojo.
  • Use after free in WebAudio.
  • Out of bounds reminiscence entry in libavif.
  • Use after free in libavif.
  • Integer overflow in Skia.

“We’d additionally prefer to thank all safety researchers that labored with us throughout the improvement cycle to stop safety bugs from ever reaching the secure channel,” the Chrome crew wrote in the put up concerning the safety replace.

TechRepublic contacted Apple and Google for commentary about this story. Apple referred us to the safety launch notes; Google has not responded on the time of publication.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles