HomeCII/OTApple Fixes Three Zero-Day Vulnerabilities Potentially Already Used by Hackers.

Apple Fixes Three Zero-Day Vulnerabilities Potentially Already Used by Hackers.

Published on

spot_img

Apple has issued a warning to users of its iOS, macOS, and iPad products regarding three zero-day vulnerabilities discovered in its WebKit browser platform. The vulnerabilities, which are identified as CVE-2023-32409, CVE-2023-28204, and CVE-2023-32373, can reportedly be exploited by hackers for malicious activities such as arbitrary code execution. Apple advised users of impacted devices to update their software as soon as possible to remedy the security flaws.

According to Apple, the vulnerabilities affect several devices, including iPhone 8 and later, iPad Pro (all models), iPad Air 3rd generation and later, iPad 5th generation and later, and iPad mini 5th generation and later.

CVE-2023-32409 is described as a flaw wherein remote attackers can break out of the Web Content sandbox and take over the system. On the other hand, CVE-2023-28204 relates to processing web content that may reveal sensitive information. Meanwhile, CVE-2023-32373 warns that maliciously crafted web content may lead to arbitrary code execution.

The tech giant has acknowledged that the vulnerabilities may have already been exploited by hackers, but has not disclosed details regarding any reported incidents. Despite this, Apple has warned users that the vulnerabilities pose a significant threat and should not be taken lightly.

“The impact of these vulnerabilities is severe,” said Apple’s security update advisory. “An attacker could exploit these vulnerabilities to take control of an affected system, access sensitive information, or cause a denial of service.”

Two of the vulnerabilities were reportedly discovered and reported by anonymous researchers, but the third one, CVE-2023-32409, was reported by Clément Lecigne, a security engineer on Google’s Threat Analysis Group, and Donncha Ó Cearbhaill, a hacker and security researcher in Amnesty International’s Security Lab.

Kudos to the researchers who found the vulnerability and reported it as soon as possible. Apple, too, quickly issued a security advisory. But it’s a worrisome sign that such vulnerabilities go unnoticed and could have been exploited by hackers for extended periods. The discovery further highlights the need for companies to invest in cybersecurity research and for consumers to keep their devices updated.

Hackers work hard to exploit vulnerabilities in systems, and exploits such as these reveal that companies still have a long way to go, despite their best efforts to secure their systems. Apple, which has always touted its security credentials, has faced such incidents in the past as well. For instance, in November last year, a vulnerability was discovered that could have allowed hackers to access iPhones and other Apple devices without any user interaction.

Industry experts often say that vulnerability disclosure can be a double-edged sword. While it is always better to know if your system is vulnerable so you can take the necessary actions to fix it, it can also give hackers an opening to exploit the vulnerability before it is patched. Users and companies should, therefore, stay vigilant and take steps to ensure the security of their systems as much as possible.

Source link

Latest articles

Strengthening Cyber Resilience Through Supplier Management

 Recent data shows third-party and supply chain breaches — including software supply chain attacks...

A New Wave of Finance-Themed Scams

 The hyperconnected world has made it easier than ever for businesses and consumers...

New DroidLock malware locks Android devices and demands a ransom

 A newly discovered Android malware dubbed DroidLock can lock victims’ screens for ransom...

Hamas-Linked Hackers Probe Middle Eastern Diplomats

 A cyber threat group affiliated with Hamas has been conducting espionage across the...

More like this

Strengthening Cyber Resilience Through Supplier Management

 Recent data shows third-party and supply chain breaches — including software supply chain attacks...

A New Wave of Finance-Themed Scams

 The hyperconnected world has made it easier than ever for businesses and consumers...

New DroidLock malware locks Android devices and demands a ransom

 A newly discovered Android malware dubbed DroidLock can lock victims’ screens for ransom...