Apple patches new zero-day exploited to hack iPhones, iPads, Macs

by | Feb 11, 2022 | News

Reading Time: 1 Minute

Apple has released security updates to fix a new zero-day vulnerability exploited in the wild by attackers to hack iPhones, iPads, and Macs.

 

The zero-day patched today is tracked as CVE-2022-22620 [12] and is a WebKit Use After Free issue that could lead to OS crashes and code execution on compromised devices.

Successful exploitation of this bug allows attackers to execute arbitrary code on iPhones and iPads running vulnerable versions of iOS and iPadOS after processing maliciously crafted web content.

“Apple is aware of a report that this issue may have been actively exploited,” the company said when describing the zero-day.

Apple addressed CVE-2022-22620 with improved memory management in iOS 15.3.1, iPadOS 15.3.1, and macOS Monterey 12.2.1.

 

 

 

See Also: Complete Offensive Security and Ethical Hacking Course

 

 

 

The complete list of impacted devices is quite extensive, as the bug affects older and newer models, and it includes:

  • iPhone 6s and later,
  • iPad Pro (all models), iPad Air 2 and later, iPad 5th generation and later, iPad mini 4 and later, and iPod touch (7th generation)
  • Macs running macOS Monterey

Although this zero-day was likely only used in targeted attacks, it’s still strongly recommended to install the updates as soon as possible to block potential attack attempts.

 
 
 

 

 

Third zero-day patched this year by Apple

 

In January, Apple patched two other zero-days exploited in the wild that could allow threat actors to achieve arbitrary code execution with kernel privileges (CVE-2022-22587) and track browsing activity and users’ identities in real-time (CVE-2022-22594).

These first two zero-days impacted iPhones (iPhone 6s and up), Macs running macOS Monterey, and multiple models of iPads.

While Apple has patched only three zero-days since the start of 2022, the company had to deal with an almost interminable stream of zero-days exploited in the wild to target iOS, iPadOS, and macOS devices.

 

 

See Also: Offensive Security Tool: Stratus Red Team

 

 

 

The list includes multiple zero-day flaws used to install NSO’s Pegasus spyware on iPhones belonging to journalists, activists, and politicians.

 

Are u a security researcher? Or a company that writes articles or write ups about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing?

If you want to express your idea in an article contact us here for a quote: [email protected]

 

 

 

See Also: How ILOVEYOU worm became the first global computer virus pandemic

 

Source: www.bleepingcomputer.com

 

Source Link

 


 

merch

Share This