Apple has swiftly responded to critical security concerns by releasing urgent updates to rectify two actively exploited zero-day vulnerabilities. These vulnerabilities, CVE-2024-23225 and CVE-2024-23296, pose significant risks, allowing attackers with arbitrary kernel read and write capabilities to bypass crucial kernel memory protections. Apple has addressed these issues through enhanced validation mechanisms implemented in iOS 17.4, iPadOS 17.4, iOS 16.7.6, and iPadOS 16.7.6.
The updates cater to a wide range of Apple devices, including iPhones, iPads, and specific models such as iPhone 8 and later, as well as iPad Pro models from the 2nd generation onwards. This proactive approach from Apple marks the third instance this year where the company has tackled actively exploited zero-day vulnerabilities. Previously, Apple addressed a confusion flaw in WebKit, which could lead to arbitrary code execution across various Apple platforms, including iOS, iPadOS, macOS, tvOS, and Safari web browser.
Affected Systems
-
IoC’s
-
Recommended Solution(s)
Apple has released two zero-day vulnerability updates for the following products. If you are not on iOS 17.4 or iPadOS 17.4 on your Apple devices, it is recommended that you make the specified updates as soon as possible on your personal devices specified below.
CVE / CWE
CVE-2024-23225 & CVE-2024-23296
Related Website(s)
* Vulnerabilities with a CVSS 3.1 score between 7.0 and 8.9 are evaluated to be “high” whereas vulnerabilities with a CVSS 3.1 score between 9.0 and 10.0 are evaluated to be “critical”.
+90 216 504 53 32
Aydınevler Mahallesi,İsmet İnönü Cadddesi,Küçükyalı Ofis Park A Blok,No:20/1 Maltepe İstanbul
+90 312 235 44 51
You can register to our newsletter on the home page to be instantly informed about security vulnerabilities.