Apple Fixes 3 More Zero-Day VulnerabilitiesApple Fixes 3 More Zero-Day Vulnerabilities
All of the security bugs are under active attacks, but the extent of their exploitation is unknown.
![The front of an Apple store The front of an Apple store](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blte84028dc56263519/64f1098e4652450d55fb4e2f/Apple_fazon1_iStock_000060706006_Medium.png?width=1280&auto=webp&quality=95&format=jpg&disable=upscale)
In an emergency security update, Apple has identified three zero-day vulnerabilities affecting iPhones and Mac products that are actively being exploited.
One vulnerability, tracked as CVE-2023-41992, is a flaw found in the Kernel Framework that threat actors can exploit to escalate privileges. Two of the other vulnerabilities, tracked as CVE-2023-41993 and CVE-2023-41991. are found in the WebKit browser engine and the Security Framework, respectively. Threat actors gain the ability to potentially "bypass signature validation" as well as "gain arbitrary code execution via maliciously crafted webpages" should they exploit these vulnerabilities, according to Apple's advisory.
Devices that are being impacted by these zero-days vary between older and more recent models of Apple products, including iPhone 8 and later; iPad mini 5th generation and later; any Mac running on macOS Monterey or later; and the Apple Watch Series 4 and later.
These issues have been fixed in iOS 16.7, iPadOS 16.7, OS 17.0.1, iPadOS 17.0.1, and Safari 16.6.1, and were first discovered and reported by Bill Marczak at Citizen Lab and Maddie Stone at Google's Threat Analysis Group. Citizen Lab typically keeps tabs on spyware cases, but so far there are no details available as to the nature of the in-the-wild exploits or attacks.
"Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7," the National Vulnerability Database stated, though the extent to which they were exploited is unknown.
About the Author
You May Also Like
Uncovering Threats to Your Mainframe & How to Keep Host Access Secure
Feb 13, 2025Securing the Remote Workforce
Feb 20, 2025Emerging Technologies and Their Impact on CISO Strategies
Feb 25, 2025How CISOs Navigate the Regulatory and Compliance Maze
Feb 26, 2025Where Does Outsourcing Make Sense for Your Organization?
Feb 27, 2025