Apple Released an important security update for iOS, macOS and fixed a critical FaceTime Zero day vulnerability that affected iOS & macOS.
A critical FaceTime Bug allows you to call anyone with Facetime and start to hear the audio from the recipient phone before they answer or reject the incoming call.
New Fixes of iOS 12.1.4 effective to iPhone 5s and later, iPad Air and later, and iPod touch 6th generation.
FaceTime Zero day bug was originally reported to Apple by 14-year-old Michele Thompson of Catalina Foothills High School, Daven Morris of Arlington, TX .
Along with this, Apple fixed the another 2 zero-day flow that was reported by Google Project Zero-day Team lead Ben Hawkes on Twitter that affected
IOKit( CVE-2019-7287 ) and foundation(CVE-2019-7286).
It was a Memory corruption vulnerability and an ability to execute arbitrary code with kernel privileges in iOS, and another zero-day flow allows to gain elevated privileges.
Apple found another FaceTime flaw in live photos during the an internals security audit and the issue was addressed with improved validation on the FaceTime server.
An another vulnerability fixed by Apple that reported for Shortcuts 2.1.3 for iOS and macOS allow a local user may be able to view senstive user information.
Name and information link | Available for | Release date |
---|---|---|
Shortcuts 2.1.3 for iOS | Shortcuts 2.1.2 for iOS | 07 Feb 2019 |
macOS Mojave 10.14.3 Supplemental Update | macOS Mojave 10.14.3 | 07 Feb 2019 |
iOS 12.1.4 | iPhone 5s and later, iPad Air and later, and iPod touch 6th generation | 07 Feb 2019 |
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.
5 Things You Need To Do Before Selling iPhone
New Unpatched macOS Zero-day Flaw Allows Attackers to Read Passwords in Plain Text & System Data
Some router models have identified a security vulnerability that allows attackers to bypass authentication. To exploit this vulnerability, an attacker…
Hackers often target CrushFTP servers as they contain sensitive data and are used for file sharing and storage. This makes…
DDoS attacks are a significant and growing risk that can overpower websites, crash servers, and block out authorized users with…
Hackers have leveraged an old Microsoft Office vulnerability, CVE-2017-8570, to deploy the notorious Cobalt Strike Beacon, targeting systems in Ukraine.…
In a historic move, Microsoft has made the source code for MS-DOS 4.0, one of the most influential operating systems…
A new attack campaign has been discovered to be employed by the FROZEN#SHADOW, which utilized SSLoad malware for its operations…