Apple rushes out iOS 15.0.2 to address a remote code execution vulnerability that is being actively exploited
Apple’s iOS zero-day problems appear to be getting worse.
Just weeks after shipping iOS 15 as a security-themed upgrade, Apple rushed out an urgent patch to address a software flaw being “actively exploited” in the wild.
The Cupertino, Calif. device maker confirmed the latest zero-day in an advisory and urged iOS and iPad users to upgrade to the newest iOS 15.0.2.
This is the 72nd in-the-wild zero day attack documented so far in 2021. According to data tracked by SecurityWeek, 16 of the 72 exploited zero-days affect code in Apple’s products.
According to Apple’s advisory, the security defect (CVE-2021-30883) exists in IOMobileFrameBuffer, a kernel extension used to manage the screen frame buffer.
“An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited,” the company said.
Apple did not provide additional details on the exploitation.
[ READ: Apple Ships Urgent Patch for FORCEDENTRY Zero-Days ]
Shortly after the release of iOS 15.0.2, a security researcher reverse-engineered the patch and published proof-of-concept code to demonstrate the severity of the issue.
The urgent point-update comes less than a month after the release of iOS 15 with a built-in two-factor authentication code generator and multiple anti-tracking security and privacy features.
The iOS 15 makeover also included patches for at least 22 documented security vulnerabilities, some serious enough to expose iPhone and iPad users to remote denial-of-service and local code execution attacks.
According to Apple, the built-in authenticator can generate verification codes needed for additional sign-in security. “If a site offers two-factor authentication, you can set up verification codes under Passwords in Settings — no need to download an additional app. Once set up, verification codes autofill when you sign in to the site.”
Another notable feature is Mail Privacy Protection, a new feature that prevents email marketers from learning information about an iPhone user’s Mail activity.
Related: Apple Ships iOS 15 with MFA Code Generator
Related: Apple Confirms New Zero-Day Attacks on Older iPhones

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.
More from Ryan Naraine
- Anti-Bot Software Firm DataDome Banks $42M Financing
- Malware Hunters Spot Supply Chain Attack Hitting 3CX Desktop App
- LeapXpert Banks $22M Funding to Secure Corporate Messaging With Consumer Apps
- Spera Banks $10 Million to Tackle Identity and Access Sprawl
- Mandiant Catches Another North Korean Gov Hacker Group
- Microsoft Puts ChatGPT to Work on Automating Cybersecurity
- Microsoft: No-Interaction Outlook Zero Day Exploited Since Last April
- Tesla Hacked Twice at Pwn2Own Exploit Contest
Latest News
- Italy Temporarily Blocks ChatGPT Over Privacy Concerns
- FDA Announces New Cybersecurity Requirements for Medical Devices
- Report: Chinese State-Sponsored Hacking Group Highly Active
- Votiro Raises $11.5 Million to Prevent File-Borne Threats
- Lumen Technologies Hit by Two Cyberattacks
- Leaked Documents Detail Russia’s Cyberwarfare Tools, Including for OT Attacks
- Mandiant Investigating 3CX Hack as Evidence Shows Attackers Had Access for Months
- Severe Azure Vulnerability Led to Unauthenticated Remote Code Execution
