Critical Security Updates for Apple iOS and macOS Released to Address Actively Exploited Vulnerabilities

September 24, 2021

On Thursday, Apple launched important security updates to tackle multiple vulnerabilities in older iOS and macOS versions, which have been exploited in real-world attacks. This release also expands on previous patches for a security flaw targeted by NSO Group’s Pegasus spyware aimed at iPhone users.

Notably, CVE-2021-30869, a type confusion vulnerability within Apple’s XNU kernel, could allow malicious apps to execute arbitrary code with elevated privileges. Apple has improved state handling to mitigate this issue. Google’s Threat Analysis Group, which reported the vulnerability, noted it was being exploited alongside a remote code execution vulnerability affecting WebKit.

Additionally, Apple addressed two more vulnerabilities, CVE-2021-30858 and CVE-2021-30860, which were patched earlier this month.

Apple Issues Critical Updates to Address Zero-Day Vulnerabilities in iOS and macOS

September 24, 2021

Apple has issued important security updates for older versions of iOS and macOS in response to vulnerabilities that are currently being actively exploited. The company identified these issues during its ongoing security monitoring and reported that exploits have been observed in the wild. Furthermore, the latest updates extend the existing patches for a previously identified security flaw that was manipulated by the NSO Group’s Pegasus spyware to target iPhone users.

Among the critical vulnerabilities addressed is CVE-2021-30869, a type confusion issue located within Apple’s XNU kernel component. This flaw enables a malicious application to execute arbitrary code with elevated privileges, which poses a significant risk to device security. To remediate the issue, Apple has implemented improved state handling measures. This specific vulnerability was highlighted by Google’s Threat Analysis Group, which reported its usage in conjunction with an existing N-day remote code execution vulnerability targeting WebKit, Apple’s web browser engine.

In addition to CVE-2021-30869, Apple also resolved two other critical vulnerabilities, identified as CVE-2021-30858 and CVE-2021-30860. The resolution of these flaws, addressed earlier in the month, emphasizes the urgent need for organizations using Apple products to update their systems to safeguard against potential attacks.

The nature of these vulnerabilities and the targeted exploits raises significant concerns for businesses and their data security. Given that these vulnerabilities could be exploited to gain initial access to devices, they highlight the importance of timely software updates as a fundamental line of defense. The tactics used by adversaries in such attacks often align with techniques outlined in the MITRE ATT&CK framework, including privilege escalation and remote code execution, which can enable cybercriminals to pivot and further compromise organizational assets.

Companies utilizing Apple products must be particularly vigilant and proactive in applying the latest updates to mitigate the risks associated with these vulnerabilities. Failure to do so not only exposes individual devices but also potentially compromises the broader organizational network.

In conclusion, Apple’s latest update serves as a crucial reminder of the evolving landscape of cybersecurity threats. Business owners are advised to prioritize the implementation of recommended security patches and to remain informed about new vulnerabilities as they arise to protect their digital environments effectively.

Source link