Article Details
Scrape Timestamp (UTC): 2024-01-31 19:04:42.739
Original Article Text
Click to Toggle View
CISA warns of patched iPhone kernel bug now exploited in attacks. CISA warned today that a patched kernel security flaw affecting Apple iPhones, Macs, TVs, and watches is now being actively exploited in attacks. Tracked as CVE-2022-48618 and discovered by Apple's security researchers, the bug was only disclosed on January 9th in an update to a security advisory published in December 2022. The company has yet to reveal if the vulnerability was also silently patched more than two years ago when the advisory was first issued. "An attacker with arbitrary read and write capability may be able to bypass Pointer Authentication," the company revealed this month. "Apple is aware of a report that this issue may have been exploited against versions of iOS released before iOS 15.7.1." This improper authentication security vulnerability enables attackers to bypass Pointer Authentication, a security feature designed to block attacks trying to exploit memory corruption bugs. Apple addressed the flaw with improved checks on devices running iOS 16.2 or later, iPadOS 16.2 or later, macOS Ventura or newer, tvOS 16.2 or higher, and watchOS 9.2 or later. The list of devices impacted by this actively exploited flaw is quite extensive and it affects both older and newer models, including: Federal agencies ordered to patch by February 21st While Apple has yet to share more details on CVE-2022-48618 active exploitation in the wild, CISA has added the vulnerability to its Known Exploited Vulnerabilities Catalog. It also ordered U.S. federal agencies to patch the bug by February 21st, as required by a binding operational directive (BOD 22-01) issued in November 2021. Last week, Apple also released security updates to patch this year's first zero-day bug (CVE-2024-23222) exploited in attacks, a WebKit confusion issue that attackers could exploit to gain code execution on vulnerable iPhones, Macs, and Apple TVs. The same day, the company also backported patches to older iPhone and iPad models for two more WebKit zero-days tracked as CVE-2023-42916 and CVE-2023-42917 and patched in November for newer devices.
Daily Brief Summary
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning regarding a kernel security flaw in Apple devices being actively exploited in the wild.
The vulnerability, identified as CVE-2022-48618, affects iPhones, Macs, Apple TVs, and watches, potentially allowing attackers arbitrary read and write access.
Apple's security researchers discovered the flaw, which can bypass Pointer Authentication, a critical memory corruption mitigation feature.
Devices running iOS 16.2, iPadOS 16.2, macOS Ventura, tvOS 16.2, and watchOS 9.2 or later have received security updates to address this issue.
CISA has mandated federal agencies to patch affected systems by February 21st, under the authority of a binding operational directive from November 2021.
Apple's recent updates also addressed the first zero-day bug of the year and two additional WebKit zero-days for various Apple device models.