Since the start of this year, there have been 8 zero-day vulnerabilities discovered by Apple that have been used to attack iPhones and iPads remotely. The ninth zero-day bug (CVE-2022-42827) has now been fixed by Apple as part of the latest security updates.
In a recent announcement, Apple confirmed that CVE-2022-42827 is an active flaw that is being exploited in the wild. It was also warned by Apple in a security assessment that this vulnerability could lead to arbitrary code execution attacks against iPhones and iPads.
The CVE-2022-42827 is a zero-day vulnerability that exploits out-of-bounds writes to the kernel. There are at least 20 known security issues that have been fixed with this major iOS update.
Apple was informed about this zero-day flaw by an anonymous researcher who reported the vulnerability anonymously. An insufficient memory buffer is a consequence of software writing data outside the current memory buffer boundaries, and it’s the actual cause of this flaw.
Here below we have mentioned the effects of flaws that can appear if exploited by threat actors:-
A subsequent write of data to the buffer will result in these undefined results. Apart from this, with kernel privileges, the threat actors could also execute arbitrary code remotely on the affected devices.
Name and information link | Available for | Release date |
---|---|---|
Safari 16.1 | macOS Big Sur and macOS Monterey | 24 Oct 2022 |
iOS 16.1 and iPadOS 16 | iPhone 8 and later, iPad Pro (all models), iPad Air 3rd generation and later, iPad 5th generation and later, iPad mini 5th generation and later | 24 Oct 2022 |
macOS Big Sur 11.7.1 | macOS Big Sur | 24 Oct 2022 |
macOS Monterey 12.6.1 | macOS Monterey | 24 Oct 2022 |
macOS Ventura 13 | Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) | 24 Oct 2022 |
tvOS 16.1 | Apple TV 4K, Apple TV 4K (2nd generation), and Apple TV HD | 24 Oct 2022 |
watchOS 9.1 | Apple Watch Series 4 and later | 24 Oct 2022 |
Here below we have mentioned all the Apple devices that are affected by this zero-day:-
The following versions of Apple’s software have been updated to address this zero-day vulnerability:-
Additionally, Apple has also improved its bounds checking with these latest updates. However, Apple has not yet announced any information regarding the exploits of this vulnerability.
Apple intends to ensure all its users are patched as soon as possible to make sure that they are secure from any exploits or attacks that may be targeted at them.
Managed DDoS Attack Protection for Applications – Download Free Guide
Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims…
The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ advanced…
A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to execute…
Meta has announced the removal of over 2 million accounts connected to malicious activities, including…
Critical security vulnerability has been identified in Veritas Enterprise Vault, a widely-used archiving and content…
A critical security vulnerability has been disclosed in the popular file archiving tool 7-Zip, allowing…