Article Details

Scrape Timestamp (UTC): 2023-09-25 00:15:00.518

Source: https://thehackernews.com/2023/09/apple-rushes-to-patch-3-new-zero-day.html

Original Article Text

Click to Toggle View

Apple Rushes to Patch 3 New Zero-Day Flaws: iOS, macOS, Safari, and More Vulnerable. Apple has released yet another round of security patches to address three actively exploited zero-day flaws impacting iOS, iPadOS, macOS, watchOS, and Safari, taking the total tally of zero-day bugs discovered in its software this year to 16. The list of security vulnerabilities is as follows - Apple did not provide additional specifics barring an acknowledgement that the "issue may have been actively exploited against versions of iOS before iOS 16.7." The updates are available for the following devices and operating systems - Credited with discovering and reporting the shortcomings are Bill Marczak of the Citizen Lab at the University of Toronto's Munk School and Maddie Stone of Google's Threat Analysis Group (TAG), indicating that they may have been abused as part of highly-targeted spyware aimed at civil society members who are at heightened risk of cyber threats. The disclosure comes two weeks after Apple resolved two other actively exploited zero-days (CVE-2023-41061 and CVE-2023-41064) that have been chained as part of a zero-click iMessage exploit chain named BLASTPASS to deploy a mercenary spyware known as Pegasus. This was followed by both Google and Mozilla shipping fixes to contain a security flaw (CVE-2023-4863) that could result in arbitrary code execution when processing a specially crafted image. Ready to tackle new AI-driven cybersecurity challenges? Join our insightful webinar with Zscaler to address the growing threat of generative AI in cybersecurity. There is evidence to suggest that both CVE-2023-41064, a buffer overflow vulnerability in the Apple's Image I/O image parsing framework, and CVE-2023-4863, a heap buffer overflow in the WebP image library (libwebp), could refer to the same bug, according to Isosceles founder and former Google Project Zero researcher Ben Hawkes. Rezilion, in an analysis published Thursday, revealed that the libwebp library is used in several operating systems, software packages, Linux applications, and container images, highlighting that the scope of the vulnerability is much broader than initially assumed. "The good news is that the bug seems to be patched correctly in the upstream libwebp, and that patch is making its way to everywhere it should go," Hawkes said. "The bad news is that libwebp is used in a lot of places, and it could be a while until the patch reaches saturation."

Daily Brief Summary

CYBERCRIME // Apple Rushes Security Patches for Exploited Zero-Day Flaws in Multiple Devices

Apple has released numerous security patches to fix three actively exploited zero-day vulnerabilities across its iOS, iPadOS, macOS, watchOS, and Safari software, pushing their total zero-day bug find for the year to 16.

The tech giant has not provided specifics about the security issues but did note that the vulnerabilities had potentially been exploited against versions of iOS earlier than iOS 16.7.

Bill Marczak from the Citizen Lab at the University of Toronto's Munk School and Maddie Stone from Google's Threat Analysis Group (TAG), who both reported the flaws, suggest they may have been used for malicious spyware aimed at civil society individuals at high risk of cyber threats.

Two weeks prior, Apple dealt with two other exploited zero-day flaws (CVE-2023-41061 and CVE-2023-41064) used in a zero-click iMessage exploit chain named BLASTPASS to distribute Pegasus, an infamous spyware.

An analysis from cybersecurity firm Rezilion highlighted that a flaw in the libwebp library, already patched by Google and Mozilla, exists across various operating systems, software packages, Linux apps, and container images, broadening the potential attack surface.