• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
apple fixes 2 zero day security bugs, one exploited in the

Apple Fixes 2 Zero-Day Security Bugs, One Exploited in the Wild

You are here: Home / Latest Cyber Security Vulnerabilities / Apple Fixes 2 Zero-Day Security Bugs, One Exploited in the Wild
January 26, 2022

iOS 15.3 & iPadOS 15.3 correct the Safari browser flaw that could have spilled users’ searching facts, in addition a zero day IOMobileFrameBuffer bug exploited in the wild.

Apple on Wednesday introduced 13 patches for serious security bugs in macOS and 10 for flaws in iOS/iPadOS. They incorporate fixes for two zero-day bugs, one particular of which could have been exploited by attackers in the wild.

The to start with zero-day (CVE-2022-22587) is a memory-corruption issue that could be exploited by a malicious application to execute arbitrary code with kernel privileges. The bug specially exists in the IOMobileFrameBuffer – a kernel extension that makes it possible for builders to command how a device’s memory handles the display screen show, aka a framebuffer. It has an effect on iOS, iPadOS and macOS Monterey, and Apple resolved it with enhanced input validation.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Apple also said it is informed of a report that indicates it may perhaps have been actively exploited in the wild.

The update is obtainable for iPhone 6s and later, iPad Pro (all products), iPad Air 2 and later, iPad 5th technology and afterwards, iPad mini 4 and afterwards, and iPod touch (7th technology).

Facts-Exposing Apple Safari Bug Squashed

Also out is a correct for a second zero working day: a greatly revealed WebKit flaw in the pervasive Safari browser which is tracked as CVE-2022-22594. The data-disclosure issue affects browsers for macOS, iOS and iPadOS. Disclosed by FingerprintJS researchers very last week, it enables a snooping website to discover out information and facts about other tabs a person may have open.

That bug is a cross-origin policy violation in the IndexDB API – a JavaScript API presented by web browsers to handle a NoSQL database of JSON objects –that Apple also resolved with improved enter validation.

Generally, a web browser permits scripts on a single web web site to accessibility knowledge on a second web website page only if both of those pages have the exact same origin/again-conclusion server. With out this security policy in position, a snooper who manages to inject a destructive script into just one internet site would be able to have totally free accessibility to any details contained in other tabs the victim may have open in the browser, together with entry to on line banking classes, email messages, health care portal information and other sensitive information.

John Bambenek, principal risk hunter for Netenrich, instructed Threatpost on Wednesday that zero-days like these two – kinds that can enable remote-code execution (RCE) on cellular units – are “among the most risky there are.”

Think cellular spy ware, imagine Pegasus, imagine country-state espionage.

“Often, these types of bugs are applied … with significant unwell intent or by governments engaged in human-rights abuses,” Bambenek said by way of email. “Unfortunately, we will possible see much more of these bugs as the 12 months goes on.”

The patches are accessible in the macOS Monterey 12.2 and the iOS/iPadOS 15.3 updates. iOS 15.3 also introduced fixes for security issues that could lead to applications getting root privileges, the capacity to execute arbitrary code with kernel privileges, and the ability for applications to get at person data files by way of iCloud.

Verify out our cost-free forthcoming are living and on-demand from customers on-line town halls – exclusive, dynamic conversations with cybersecurity specialists and the Threatpost local community.


Some pieces of this article are sourced from:
threatpost.com

Previous Post: «new year, new threats: 4 tips to activate your best New Year, New Threats: 4 Tips to Activate Your Best Cyber-Defense
Next Post: TrickBot Crashes Security Researchers’ Browsers in Latest Upgrade trickbot crashes security researchers’ browsers in latest upgrade»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.