Apple has recently taken swift action to patch two zero-day vulnerabilities that posed a potential threat of exploitation in cyberattacks.
The vulnerabilities have been successfully fixed in emergency security updates released by Apple to safeguard its devices, such as iPhones, Macs, and iPads, against potential breaches.
One of the most alarming revelations is that Apple may have already known the exploitation of these zero-day vulnerabilities in the wild.
Since we all know that Apple always follows a strict curriculum while handling or making public any technical details regarding zero-day flaws.
Experts from Amnesty International and Google’s Threat Analysis Group (TAG) have identified these two zero-day vulnerabilities:-
The two zero-day vulnerabilities were tracked as follows:-
The successful exploitation of CVE-2023-28206 will enable an attacker to gain kernel privileges using a maliciously crafted application and execute arbitrary code on the target’s devices.
The successful exploitation of CVE-2023-28205 enables the threat actors to deceive targets into downloading malicious web pages under their control, potentially resulting in the execution of arbitrary code on compromised devices.
While apart from this, it has been confirmed by security analysts that hackers exploiting these two vulnerabilities tend to focus their attacks on human rights workers.
Even these two zero-day vulnerabilities could be chained together with other security flaws in the wild to exploit iOS devices.
One of the most concerning issues is that several users will remain vulnerable to these zero-day flaws since the threat actors are actively exploiting these zero-day flaws before any patches have been released.
It appears that Apple has provided quite a comprehensive list of vulnerable devices, and these devices include:-
Apple released several emergency security updates in an attempt to address these two zero-day vulnerabilities, and here below, we have mentioned them:-
Cybersecurity researchers have urged users to immediately update their devices to prevent any potential breach or exploitation.
Struggling to Apply The Security Patch in Your System? –
A sophisticated cyber campaign orchestrated by the Chinese Advanced Persistent Threat (APT) group, Silver Fox,…
A new wave of cyberattacks attributed to the Ghostwriter Advanced Persistent Threat (APT) group has…
The LCRYX ransomware, a malicious VBScript-based threat, has re-emerged in February 2025 after its initial…
Recent cybersecurity investigations have uncovered a sophisticated technique employed by threat actors to evade detection…
A financial management app named Finance Simplified has been revealed as a malicious tool for…
A recent discovery by cybersecurity researchers has revealed that the Poseidon malware, a macOS-targeting trojan,…