Security updates released by Apple this week address numerous vulnerabilities in macOS Catalina, iOS and iPadOS, Safari, and other software products.
macOS Catalina has received patches for the largest number of vulnerabilities, namely 52. The most affected component was tcpdump, with a total of 32 vulnerabilities. Apple fixed the security flaws by updating to tcpdump version 4.9.3 and libpcap version 1.9.1.
Apple also patched 6 security bugs in OpenLDAP by updating to version 2.4.28, as well as four vulnerabilities in Kernel, through improved memory handling. Other components that received fixes included ATS, Bluetooth, CallKit, CFNetwork Proxies, CUPS, FaceTime, libexpat, and Security.
The addressed issues included arbitrary code execution with system or kernel privileges, denial of service, disclosure of user information, elevation of privilege, and an application’s ability to read restricted memory, among others.
While most of the vulnerabilities impact macOS Catalina 10.15 only, some of them were found to affect macOS High Sierra 10.13.6 and macOS Mojave 10.14.6 as well.
The updates released for iOS and iPadOS patch a total of 14 vulnerabilities. Of these, a FaceTime bug that could lead to arbitrary code execution was also addressed with the release of iOS 12.4.4, which is for iPhone 5s, iPhone 6, iPhone 6 Plus, iPad Air, iPad mini 2, iPad mini 3, and iPod touch 6th generation.
The FaceTime vulnerability was reported to Apple by Natalie Silvanovich of Google Project Zero. This was not the first time Silvanovich informed Apple of a potentially serious FaceTime flaw.
The remaining flaws were patched in iOS 13.3 and iPadOS 13.3 — these are for iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch 7th generation — and affect the CallKit, CFNetwork Proxies, FaceTime, IOSurfaceAccelerator, IOUSBDeviceFamily, Kernel, libexpat, Photos, Security, and WebKit components.
The issues could lead to arbitrary code execution, improper sharing of audio and video data, disclosure of user information, elevation of privileges, or to calls initiated with Siri on devices with two active plans being made on the wrong cellular plan.
watchOS 6.1.1 (for Apple Watch Series 1 and later) includes patches for 10 vulnerabilities in CallKit, CFNetwork Proxies, FaceTime, IOUSBDeviceFamily, Kernel, libexpat, Security, and WebKit. tvOS 13.3 addresses 11 security flaws in these components.
Apple also addressed the FaceTime flaw discovered by Silvanovich in watchOS 5.3.4.
Safari 13.0.4 was released with patches for two vulnerabilities in WebKit that could lead to arbitrary code execution, while Xcode 11.3 arrived with a fix for an issue in ld64 that could result in arbitrary code execution with user privileges.
More information on these security updates can be found on Apple’s support page.
Related: Apple Patches Tens of Vulnerabilities in macOS Catalina, iOS 13
Related: Apple Patches iOS 13 Bug Allowing Third-Party Keyboards “Full Access”

More from Ionut Arghire
- Ransomware Will Likely Target OT Systems in EU Transport Sector: ENISA
- Ransomware Gang Publishes Data Allegedly Stolen From Maritime Firm Royal Dirkzwager
- Zoom Paid Out $3.9 Million in Bug Bounties in 2022
- Malicious NuGet Packages Used to Target .NET Developers
- Google Pixel Vulnerability Allows Recovery of Cropped Screenshots
- Millions Stolen in Hack at Cryptocurrency ATM Manufacturer General Bytes
- NBA Notifying Individuals of Data Breach at Mailing Services Provider
- Adobe Acrobat Sign Abused to Distribute Malware
Latest News
- Burnout in Cybersecurity – Can it be Prevented?
- Spain Needs More Transparency Over Pegasus: EU Lawmakers
- Ransomware Will Likely Target OT Systems in EU Transport Sector: ENISA
- Virtual Event Today: Supply Chain & Third-Party Risk Summit
- Google Suspends Chinese Shopping App Amid Security Concerns
- Verosint Launches Account Fraud Detection and Prevention Platform
- Ransomware Gang Publishes Data Allegedly Stolen From Maritime Firm Royal Dirkzwager
- Zoom Paid Out $3.9 Million in Bug Bounties in 2022
