Categories: Software Updates

Apple Fixes Ninth Zero-day Bug Exploited in the Wild This Year

Apple Fixes Ninth Zero-day Bug Exploited in the Wild This Year

Apple has fixed two iOS zero-day vulnerabilities that “may have been actively exploited” to hack into older iPhone, iPad, and iPod devices.

The two bugs (tracked as CVE-2021-30761 and CVE-2021-30762) are caused by memory corruption and use after free issues in the WebKit browser engine, both found and reported by anonymous researchers.

Webkit is a browser rendering engine used by Apple web browsers and applications to render HTML content on desktop and mobile platforms, including iOS, macOS, tvOS, and iPadOS.

Attackers could exploit the two vulnerabilities using maliciously crafted web content that would trigger arbitrary code execution after being loaded by the targets on unpatched devices.

Also Read: Got Hacked? Here Are 5 Ways to Handle Data Breaches

Impacted devices include older:

  • iPhones (iPhone 5s, iPhone 6, iPhone 6 Plus).
  • iPads (iPad Air, iPad mini 2, iPad mini 3).
  • and the iPod touch (6th generation).

“Apple is aware of a report that this issue may have been actively exploited,” Apple said when describing the two iOS 12.5.4 vulnerabilities.

Steady stream of exploited zero-days

Since March, we’ve seen a neverending stream of zero-day bugs—nine of them in total—showing up in Apple’s security advisories, most of them also tagged as having been exploited in attacks.

Last month, Apple patched a macOS zero-day (CVE-2021-30713) used by the XCSSET malware to bypass Apple’s TCC protections designed to safeguard its users’ privacy.

Apple also addressed three zero-days (CVE-2021-30663, CVE-2021-30665, and CVE-2021-30666) in May, bugs found in the Webkit engine allowing arbitrary remote code execution (RCE) on vulnerable devices simply by visiting malicious websites.

The company also issued security updates to address one more iOS zero-day (CVE-2021-1879) in March and zero-days in iOS (CVE-2021-30661) and macOS zero-day (CVE-2021-30657) in April.

Also Read: Compliance Course Singapore: Spotlight on the 3 Offerings

The latter was exploited by Shlayer malware to bypass Apple’s File Quarantine, Gatekeeper, and Notarization security checks.

Privacy Ninja

Recent Posts

Role of Enhanced Access Controls in Safeguarding Personal Data in Telecommunications

Role of Enhanced Access Controls in Safeguarding Personal Data in Telecommunications that every Organisation in…

2 weeks ago

Role of Effective Incident Response Procedures in Strengthening Data Security

Effective Incident Response Procedures in Strengthening Data Security that every Organisation in Singapore should know…

2 weeks ago

Strengthening Your Cyber Defenses: The Crucial Role of Regular Vulnerability Scanning

Crucial Role of Regular Vulnerability Scanning that every Organisation in Singapore should know. Strengthening Your…

2 weeks ago

Enhancing Data Security with Multi-Factor Authentication

Enhancing Data Security with Multi-Factor Authentication that every Organisation in Singapore should know. Enhancing Data…

3 weeks ago

A Strong Password Policy: Your Organization’s First Line of Defense Against Data Breaches

Strong Password Policy as a first line of defense against data breaches for Organisations in…

3 weeks ago

Enhancing Website Security: The Importance of Efficient Access Controls

Importance of Efficient Access Controls that every Organisation in Singapore should take note of. Enhancing…

4 weeks ago