Mobile & Wireless

Apple Blunts Zero-Day Attacks With iOS 17.4 Update

Apple rolls out urgent patches to fix multiple security flaws in its flagship iOS platform and warned about zero-day exploits in the wild.

iPhone exploit

Today is an important day to apply security patches to iPhones old and new.

Apple on Tuesday rolled out an urgent software update to fix multiple security flaws in its flagship iOS platform and warned there is evidence of zero-day exploits in the wild.

The Cupertino device maker shipped several mobile OS updates — iOS 17.4, iPadOS 17.4, and iOS 16.7.6 — to cover the security defects and confirmed exploitation in the wild with a terse note: “Apple is aware of a report that this issue may have been exploited.”

The two exploited vulnerabilities:

  • Kernel (CVE-2024-23225) — An attacker with arbitrary kernel read and write capability may be able to bypass kernel memory protections. Apple is aware of a report that this issue may have been exploited. Description: A memory corruption issue was addressed with improved validation.
  • RTKit (CVE-2024-23296) —  An attacker with arbitrary kernel read and write capability may be able to bypass kernel memory protections. Apple is aware of a report that this issue may have been exploited. A memory corruption issue was addressed with improved validation.

The company marked the kernel flaw in the ‘exploited’ category on older versions of iOS.

Apple also patched a privacy flaw in the Accessibility feature that could allow apps to read sensitive location information; and a Safari Private Browsing bug that exposed user’s locked tabs while switching tab groups when Locked Private Browsing is enabled.

The company noted that CVEs describing additional vulnerabilities will be added to the advisory later, suggesting multiple more fixes have not yet been documented.

Related: Apple Patches Vision Pro Flaw as CISA Warns of iOS Exploitation

Related: Apple Ships iOS 17.3, Warns of WebKit Zero-Day Exploitation

Advertisement. Scroll to continue reading.

Related: VMware Patches Critical ESXi Sandbox Escape Flaws

Related: Windows Zero-Day Exploited by North Korean Hackers

Related Content

Nation-State

MITRE has shared more details on the recent hack, including the new malware involved in the attack and a timeline of the attacker’s activities.

Malware & Threats

More than 1,400 CrushFTP servers remain vulnerable to an actively exploited zero-day for which PoC has been published.

Malware & Threats

Palo Alto Networks has started releasing hotfixes for the firewall zero-day CVE-2024-3400, which some have linked to North Korea’s Lazarus. 

Malware & Threats

Microsoft patches CVE-2024-29988 and CVE-2024-26234, two zero-day vulnerabilities exploited by threat actors to deliver malware.

Government

Ivanti releases a carefully scripted YouTube video and an open letter from chief executive Jeff Abbott vowing to fix the entire security organization.

Malware & Threats

Google ships a security-themed Chrome browser refresh to fix flaws exploited at the CanSecWest Pwn2Own hacking contest.

Malware & Threats

Despite a surge in zero-day attacks, data shows that security investments into OS and software exploit mitigations are forcing attackers to find new attack...

Malware & Threats

North Korean group Lazarus exploited AppLocker driver zero-day CVE-2024-21338 for privilege escalation in attacks involving FudModule rootkit.

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version