Connect with us

Hi, what are you looking for?


Application Security

Apple Patches Remote Code Execution Bug in WebKit

Apple on Monday released patches for a vulnerability in WebKit that could allow attackers to execute code remotely on affected devices.

Apple on Monday released patches for a vulnerability in WebKit that could allow attackers to execute code remotely on affected devices.

Tracked as CVE-2021-1844 and co-reported by Clément Lecigne of Google’s Threat Analysis Group and Alison Huffman of Microsoft Browser Vulnerability Research, the flaw was addressed with software updates for macOS, iOS, watchOS, and Safari.

To exploit the vulnerability, an attacker would simply need to craft a webpage containing malicious code, and then lure the victim into accessing that webpage, which would trigger the execution of code onto the victim’s machine.

“Processing maliciously crafted web content may lead to arbitrary code execution,” Apple notes. “A memory corruption issue was addressed with improved validation,” the company continues.

The issue exists because the processing of specific content in WebKit could lead to a boundary error. Once the victim accesses the attacker-crafted page, the memory corruption would be triggered, resulting in the execution of arbitrary code.

An attacker able to successfully exploit the vulnerability may essentially compromise the victim’s vulnerable system in its entirety.

Apple has addressed the vulnerability with the release of macOS Big Sur 11.2.3, iOS 14.4.1 and iPadOS 14.4.1 (for iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch (7th generation), watchOS 7.3.2, and Safari 14.0.3 (for macOS Catalina and macOS Mojave).

Users are advised to apply the available updates as soon as possible, to ensure their systems remain protected. Apple hasn’t provided information on whether the flaw is already being exploited in the wild.

Advertisement. Scroll to continue reading.

Related: Apple Patches Recent Sudo Vulnerability in macOS

Related: Apple Issues Patches for NAT Slipstreaming 2.0 Attack

Related: Apple Ships Emergency Fixes for Under-Attack iOS Zero-Day

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join us as we delve into the transformative potential of AI, predictive ChatGPT-like tools and automation to detect and defend against cyberattacks.


As cybersecurity breaches and incidents escalate, the cyber insurance ecosystem is undergoing rapid and transformational change.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...


Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.