Friday, December 8, 2023

Apple Released a Critical Security Updates for iOS 11.2.1

Apple released a new Critical security update for iOS 11.2.1 and Apple products such as tvOS, watchOS, macOS.

This Apple security update for remote attack flaw that leads to an attacker may be able to unexpectedly alter application state.

Improper input validation was the root cause of this vulnerability and Message handling issue was addressed with improved input validation.

This update available for iPhone 5s and later, iPad Air and later, and iPod touch 6th generation.

Apple tvOS 11.2.1

Security patch also released for Apple TV 4K and Apple TV (4th generation) and the same vulnerability has been discovered for this Apple TV based.

Security Researcher Tian Zhang has been reported this vulnerability to Apple and CVE-2017-139;03 has been assigned.

Also Read:  Microsoft Released New Security Patch Updates for More than 30 Critical Security Issues

Apple  iCloud for Windows 7.2

A vulnerability that discovered in APNs Server Leads to an attacker in a privileged network position can track a user which has been identified in the use of client certificates with help of revised protocol.

A team(FURIOUSMAC ) from  United States Naval Academy has reported this vulnerability to apple and CVE-2017-13864 has been Assigned.

Also, another critical vulnerability Discovered that performs maliciously crafted web content may lead to arbitrary code execution.

This vulnerability has been patched and adds into common vulnerability database.

  • CVE-2017-7156: an anonymous researcher
  • CVE-2017-7157: an anonymous researcher
  • CVE-2017-13856: Jeonghoon Shin
  • CVE-2017-13870: an anonymous researcher
  • CVE-2017-13866: an anonymous researcher
Name and information linkAvailable forRelease date
iCloud for Windows 7.2Windows 7 and later13 Dec 2017
tvOS 11.2.1Apple TV 4K and Apple TV (4th generation)13 Dec 2017
iOS 11.2.1iPhone 5s and later, iPad Air and later, and iPod touch 6th generation13 Dec 2017

Keeping your software up to date is one of the most important things you can do to maintain your Apple product’s security. Apple said.


Latest articles

Exploitation Methods Used by PlugX Malware Revealed by Splunk Research

PlugX malware is sophisticated in evasion, as it uses the following techniques to avoid...

TA422 Hackers Attack Organizations Using Outlook & WinRAR Vulnerabilities

Hackers exploit Outlook and WinRAR vulnerabilities because these widely used software programs are lucrative...

Bluetooth keystroke-injection Flaw: A Threat to Apple, Linux & Android Devices

An unauthenticated Bluetooth keystroke-injection vulnerability that affects Android, macOS, and iOS devices has been...

Atlassian Patches RCE Flaw that Affected Multiple Products

Atlassian has been discovered with four new vulnerabilities associated with Remote Code Execution in...

Reflectiz Introduces AI-powered Insights on Top of Its Smart Alerting System

Reflectiz, a cybersecurity company specializing in continuous web threat management, proudly introduces a new...

SLAM Attack Gets Root Password Hash in 30 Seconds

Spectre is a class of speculative execution vulnerabilities in microprocessors that can allow threat...

Akira Ransomware Exploiting Zero-day Flaws For Organization Network Access

The Akira ransomware group, which first appeared in March 2023, has been identified as...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Endpoint Strategies for 2024 and beyond

Converge and Defend

What's the pulse of Unified Endpoint Management and Security (UEMS) in Europe? Join us live to uncover the strategies that are defining endpoint security in the region.

Related Articles