Apple has patched its tenth zero-day vulnerability since the beginning of the year, with the most recent one being actively utilized in attacks against iPhones.
Furthermore, Apple said that the bug “may have been actively exploited” against older versions in security bulletins published today for iOS/iPadOS 15.7.2, Safari 16.2, tvOS 16.2, and macOS Ventura 13.1.
According to the reports, the update patched a bug in WebKit, the browser engine that powers Safari and other apps. If exploited, the bug may have allowed malicious code to run on the user’s device. The vendor has only one day to address the vulnerability.
Type confusion is a flaw in Apple’s Webkit web browser browsing engine tracked as (CVE-2022-42856).
“Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.1”, according to Apple.
Clément Lecigne of Google’s Threat Analysis Group found the vulnerability, which enables maliciously created web content to executing arbitrary code on a susceptible device.
Hence, arbitrary code execution could allow the malicious site to run commands in the operating system, install more spyware or malware, or carry out other malicious deeds.
A type of confusion issue was addressed with improved state handling. Apple fixed the zero-day vulnerability for the following devices: iPhone 6s (all models), iPhone 7 (all models), iPhone SE (first generation), iPad Pro (all models), iPad Air 2 and later, iPad 5th generation and later, iPad mini 4 and later, and iPod touch ((7th generation).
While Apple has confirmed that threat actors actively exploited the vulnerability, no further information on the assaults has been released.
Since the beginning of the year, Apple has resolved ten zero-day vulnerabilities:
Hence, it is advised to install today’s security patches as soon as possible, despite the fact that this zero-day weakness was probably utilized in highly-targeted attacks.
Penetration Testing As a Service – Download Red Team & Blue Team Workspace
By fusing agentic AI and contextual threat intelligence, SecAI transforms investigation from a bottleneck into…
According to IBM Security annual research, "Cost of a Data Breach Report 2024", an average…
A critical security flaw in NVIDIA's Riva framework, an AI-powered speech and translation service, has…
CISA officially added a significant security flaw affecting Broadcom’s Brocade Fabric OS to its authoritative…
A critical vulnerability in Apple’s AirPlay protocol, dubbed AirBorne, has exposed over 2.35 billion active…
A critical vulnerability in Google Chrome has recently been discovered that allows malicious actors to…