• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
apple issues urgent patches for 2 zero day flaws exploited in

Apple Issues Urgent Patches for 2 Zero-Day Flaws Exploited in the Wild

You are here: Home / General Cyber Security News / Apple Issues Urgent Patches for 2 Zero-Day Flaws Exploited in the Wild
June 15, 2021

Apple on Monday shipped out-of-band security patches to address two zero-day vulnerabilities in iOS 12.5.3 that it states are being actively exploited in the wild.

Stack Overflow Teams

The most up-to-date update, iOS 12.5.4, will come with 3 security fixes, such as a memory corruption issue in the ASN.1 decoder (CVE-2021-30737) and two flaws concerning the WebKit browser motor that could be abused to attain distant code execution —

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


  • CVE-2021-30761 – A memory corruption issue that could be exploited to achieve arbitrary code execution when processing maliciously crafted web articles. The flaw was dealt with with enhanced point out management.
  • CVE-2021-30762 – A use-following-free of charge issue that could be exploited to obtain arbitrary code execution when processing maliciously crafted web written content. The flaw was settled with improved memory management.

Both of those CVE-2021-30761 and CVE-2021-30762 were being described to Apple anonymously, with the Cupertino-centered enterprise stating in its advisory that it truly is aware of experiences that the vulnerabilities “could have been actively exploited.” As is generally the circumstance, Apple failed to share any details on the character of the attacks, the victims that could have been targeted, or the threat actors that may be abusing them.

A person issue evident, nonetheless, is that the active exploitation attempts have been directed from owners of older devices these as iPhone 5s, iPhone 6, iPhone 6 As well as, iPad Air, iPad mini 2, iPad mini 3, and iPod touch (6th technology). The go mirrors a equivalent correct that Apple rolled out on May well 3 to remediate a buffer overflow vulnerability (CVE-2021-30666) in WebKit focusing on the identical established of devices.

Enterprise Password Management

Along with the two aforementioned flaws, Apple has patched a full of 12 zero-days impacting iOS, iPadOS, macOS, tvOS, and watchOS because the begin of the calendar year —

  • CVE-2021-1782 (Kernel) – A destructive software may well be able to elevate privileges
  • CVE-2021-1870 (WebKit) – A distant attacker may well be equipped to bring about arbitrary code execution
  • CVE-2021-1871 (WebKit) – A remote attacker may perhaps be in a position to lead to arbitrary code execution
  • CVE-2021-1879 (WebKit) – Processing maliciously crafted web content may direct to universal cross-web page scripting
  • CVE-2021-30657 (Program Tastes) – A malicious application may bypass Gatekeeper checks
  • CVE-2021-30661 (WebKit Storage)- Processing maliciously crafted web written content may direct to arbitrary code execution
  • CVE-2021-30663 (WebKit) – Processing maliciously crafted web information could guide to arbitrary code execution
  • CVE-2021-30665 (WebKit) – Processing maliciously crafted web content material may possibly lead to arbitrary code execution
  • CVE-2021-30666 (WebKit) – Processing maliciously crafted web content material could direct to arbitrary code execution
  • CVE-2021-30713 (TCC framework) – A malicious software may perhaps be equipped to bypass Privacy tastes

People of Apple devices are encouraged to update to the latest variations to mitigate the risk affiliated with the vulnerabilities.

Found this post intriguing? Comply with THN on Facebook, Twitter  and LinkedIn to read through more exclusive content we article.


Some parts of this posting are sourced from:
thehackernews.com

Previous Post: «online map visualizes the widespread presence of automated ransomware Online map visualizes the widespread presence of automated ransomware
Next Post: Irish police to be given powers to demand passwords irish police to be given powers to demand passwords»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections

Copyright © TheCyberSecurity.News, All Rights Reserved.