Apple fixes two zero-days exploited to hack iPhones and Macs

Apple fixes two zero-days exploited to hack iPhones and Macs


Apple has released emergency security updates to address two new zero-day vulnerabilities exploited in attacks to compromise iPhones, Macs, and iPads.


"Apple is aware of a report that this issue may have been actively exploited," the company said when describing the issues in security advisories published on Friday.


The first security flaw (tracked as CVE-2023-28206) is an IOSurfaceAccelerator out-of-bounds write that could lead to corruption of data, a crash, or code execution.


Successful exploitation allows attackers to use a maliciously crafted app to execute arbitrary code with kernel privileges on targeted devices.


The second zero-day (CVE-2023-28205) is a WebKit use after free weakness that allows data corruption or arbitrary code execution when reusing freed memory.


This flaw can be exploited by tricking the targets into loading malicious web pages under attackers' control, which could lead to code execution on compromised systems.


The two zero-day vulnerabilities were addressed in iOS 16.4.1, iPadOS 16.4.1, macOS Ventura 13.3.1, and Safari 16.4.1 with improved input validation and memory management.


Apple says the list of affected devices is quite extensive, and it includes:


  • iPhone 8 and later,

  • iPad Pro (all models),

  • iPad Air 3rd generation and later,

  • iPad 5th generation and later,

  • iPad mini 5th generation and later,

  • and Macs running macOS Ventura.

  • Three zero-days patched since the start ..

    Support the originator by clicking the read the rest link below.