Looking for:
Zero day attack appleZero day attack apple - Update 11/2/22:
This vulnerability is the third critical WebKit bug Apple has been made to fix this year after the first two patches were released within weeks of each other at the start of the year. The second zero-day exploit patched by Apple on Wednesday is a kernel-level code execution bug that can be abused once an attacker gains an initial foothold on an affected device. Tracked as CVE, one way an attacker could achieve that initial foothold is by exploiting the aforementioned WebKit flaw, according to researchers at Sophos.
Such privileges could afford an attacker the ability to carry out activities such as spying on apps, accessing nearly all data on the device, retrieving locations, using cameras, taking screenshots, activating the microphone, and more, he said. Like the WebKit flaw, the code required to exploit this vulnerability would have to be embedded within a maliciously crafted web page and executed after the WebKit vulnerability had already been exploited.
Reduce risk and deliver greater business success with cyber-resilience capabilities. This zero-day also affects all the aforementioned iPhone and iPad devices, in addition to Macs running macOS Monterrey.
Both issues were caused by an out-of-bounds write issue and were addressed by improving the bounds checking of the vulnerable components. The two vulnerabilities patched by Apple on Wednesday represent the sixth and seventh zero-day exploits that Apple has been forced to fix this year.
The company also patched a swathe of zero-day vulnerabilities in including the ForcedEntry exploit used by the notorious Pegasus spyware developed by NSO Group. Cost savings and business benefits enabled by Watson Assistant. Moving forward with your enterprise application portfolio. Discover the industry-leading AI platform that customers and employees want to use. Why convenience is the biggest threat to your security. Not a member yet? Register Now. Read our posting guidelinese to learn what content is prohibited.
September 12, PM 0. Patch your iPhones and Macs to block attacks Although Apple disclosed active exploitation of this vulnerability in the wild, the company is yet to release any information regarding these attacks.
In January, Apple patched two other exploited zero-days that enabled code execution with kernel privileges CVE and web browsing activity tracking CVE Sergiu Gatlan Sergiu Gatlan has covered cybersecurity, technology, and a few other topics for over a decade.
Email or Twitter DMs for tips. Previous Article Next Article. You may also like:. Popular Stories. Login Username. Remember Me. Sign in anonymously.
❿
No comments:
Post a Comment