Press "Enter" to skip to content

New Actively Exploited Zero-Day Vulnerability Discovered in Apple Products

New Actively Exploited Zero-Day Vulnerability Discovered in Apple Products

New Actively Exploited Zero-Day Vulnerability Discovered in Apple Products

On Tuesday, Apple released security patches for the Safari web browser, iOS, iPadOS, macOS, and tvOS to fix a brand-new zero-day vulnerability that could lead to the execution of malicious code.

The problem, identified as CVE-2022-42856, is a type confusion flaw in the WebKit browser engine that might be triggered while processing specially designed information and result in arbitrary code execution, according to the tech giant.

- CyberInformer_Sticky RightBanner 300x600 high cpm *

ALSO, READ Hackers Actively Exploiting Citrix ADC and Gateway Zero-Day Vulnerability

“Aware of a report that this issue may have been aggressively exploited against versions of iOS published before iOS 15.1,” the company stated.

Although specifics about the assaults’ nature are still unknown, it’s likely that they utilized some form of social engineering or watering hole to infect the devices when users visited a malicious or legitimate-but-compromised domain through their browsers.

New Actively Exploited Zero-Day Vulnerability Discovered in Apple Products

It’s important to note that due to limitations set by Apple, every third-party web browser that is available for iOS and iPadOS, including Google Chrome, Mozilla Firefox, and Microsoft Edge, among others, must use the WebKit rendering engine.

ALSO, READ Serious Attacks Could Have Been Staged Through This Amazon ECR Public Gallery Vulnerability

Credited with discovering and reporting the issue is Clément Lecigne of Google’s Threat Analysis Group (TAG). Apple noted it addressed the bug with improved state handling.

CyberSecurity

The update, which is available with iOS 15.7.2, iPadOS 15.7.2macOS Ventura 13.1tvOS 16.2, and Safari 16.2, arrives two weeks after Apple patched the same bug in iOS 16.1.2 on November 30, 2022.

The fix marks the resolution of the tenth zero-day vulnerability discovered in Apple software since the start of the year. It’s also the ninth actively exploited zero-day flaw in 2022 –

  • CVE-2022-22587 (IOMobileFrameBuffer) – A malicious application may be able to execute arbitrary code with kernel privileges
  • CVE-2022-22594 (WebKit Storage) – A website may be able to track sensitive user information (publicly known but not actively exploited)
  • CVE-2022-22620 (WebKit) – Processing maliciously crafted web content may lead to arbitrary code execution
  • CVE-2022-22674 (Intel Graphics Driver) – An application may be able to read kernel memory
  • CVE-2022-22675 (AppleAVD) – An application may be able to execute arbitrary code with kernel privileges

    New Actively Exploited Zero-Day Vulnerability Discovered in Apple Products

  • CVE-2022-32893 (WebKit) – Processing maliciously crafted web content may lead to arbitrary code execution
  • CVE-2022-32894 (Kernel) – An application may be able to execute arbitrary code with kernel privileges
  • CVE-2022-32917 (Kernel) – An application may be able to execute arbitrary code with kernel privileges
  • CVE-2022-42827 (Kernel) – An application may be able to execute arbitrary code with kernel privileges

The latest iOS, iPadOS, and macOS updates also introduce a new security feature called Advanced Data Protection for iCloud that expands end-to-end encryption (E2EE) to ‌iCloud‌ Backup, Notes, Photos, and more.


CYBERINFORMER.NET –  brings updates on the latest cyber security tips, online safety tips and cyber information, cyber security courses for Nigerians and Foreigners, Cyber security jobs for seekers and much more

If You find This article helpful please comment, subscribe and share

Be First to Comment

Leave a Reply

Mission News Theme by Compete Themes.
%d bloggers like this: