Security Experts:

Connect with us

Hi, what are you looking for?



Google Spots Attacks Exploiting iOS Zero-Day Flaws

Google security researchers revealed that two of the vulnerabilities patched by Apple on Thursday with the release of iOS 12.1.4 were zero-day flaws exploited in the wild by malicious actors.

Google security researchers revealed that two of the vulnerabilities patched by Apple on Thursday with the release of iOS 12.1.4 were zero-day flaws exploited in the wild by malicious actors.

iOS 12.1.4 resolves a total of four vulnerabilities. Two are related to the recently discovered FaceTime spying bug, and the other two are memory corruption issues that allow a malicious application to elevate privileges and execute arbitrary code.

One of the flaws, tracked as CVE-2019-7286, impacts the Foundation component in iOS and it allows a malicious application to gain elevated privileges. The second vulnerability, identified as CVE-2019-7287, impacts IOKit and it can be exploited by a malicious app to execute arbitrary code with kernel privileges.

Apple has credited Clement Lecigne of Google Threat Analysis Group, along with Ian Beer and Samuel Groß of Google Project Zero for reporting these issues. An anonymous researcher has also been credited by the tech giant.

Project Zero Team Lead Ben Hawkes revealed on Twitter that both CVE-2019-7286 and CVE-2019-7287 have been exploited in the wild, but no details have been shared about the vulnerabilities or the attacks.

Tweet from Google Project Zero researcher Tavis Ormandy

It’s worth noting that CVE-2019-7286 has also been patched in macOS Mojave with the release of a supplemental update for version 10.14.3, which also resolves the Facetime-related issues.

While it may seem that iOS and macOS vulnerabilities are rarely exploited in attacks, some experts warn that it’s actually not that uncommon.

Zimperium's Adam Donenfeld warns of attacks exploiting Apple flaws

Apple has also released an update for Shortcuts for iOS to address a local information disclosure flaw and a sandbox bypass issue.

Related: Apple Patches Dozens of Vulnerabilities in iOS, macOS

Related: Apple Patches Tens of Flaws in iOS, macOS, Safari

Related: iOS 12 Brings Patches for 16 Security Vulnerabilities

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.


Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...


Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.


The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.


WASHINGTON - Cyberattacks are the most serious threat facing the United States, even more so than terrorism, according to American defense experts. Almost half...

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.


No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.