{"id":610,"date":"2022-08-18T09:04:03","date_gmt":"2022-08-18T09:04:03","guid":{"rendered":"https:\/\/cybersecuritynest.com\/?p=610"},"modified":"2022-09-04T11:45:07","modified_gmt":"2022-09-04T11:45:07","slug":"apple-patched-two-zero-day-vulnerabilities-used-to-hack-iphones-ipads-macs","status":"publish","type":"post","link":"https:\/\/cybersecuritynest.com\/?p=610","title":{"rendered":"Apple Patched Two Zero-Day Vulnerabilities Used to Hack iPhones, iPads, Macs"},"content":{"rendered":"<aside class=\"mashsb-container mashsb-main mashsb-stretched\"><div class=\"mashsb-box\"><div class=\"mashsb-buttons\"><a class=\"mashicon-facebook mash-large mash-center mashsb-noshadow\" href=\"https:\/\/www.facebook.com\/sharer.php?u=https%3A%2F%2Fcybersecuritynest.com%2F%3Fp%3D610\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Share&nbsp;on&nbsp;Facebook<\/span><\/a><a class=\"mashicon-twitter mash-large mash-center mashsb-noshadow\" href=\"https:\/\/twitter.com\/intent\/tweet?text=&amp;url=https:\/\/cybersecuritynest.com\/?p=610&amp;via=CYBERSECNEST\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Tweet&nbsp;on&nbsp;Twitter<\/span><\/a><a class=\"mashicon-subscribe mash-large mash-center mashsb-noshadow\" href=\"#\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Subscribe&nbsp;to&nbsp;Newsletter<\/span><\/a><div class=\"onoffswitch2 mash-large mashsb-noshadow\" style=\"display:none\"><\/div><\/div>\n            <\/div>\n                <div style=\"clear:both\"><\/div><\/aside>\n            <!-- Share buttons by mashshare.net - Version: 4.0.47--><p>In order to address two zero-day vulnerabilities that were previously used by hackers to break into iPhones, iPads, or Macs, Apple has today published emergency security patches.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-611\" src=\"https:\/\/cybersecuritynest.com\/wp-content\/uploads\/2022\/08\/0x0-300x200.jpg\" alt=\"\" width=\"704\" height=\"469\" srcset=\"https:\/\/cybersecuritynest.com\/wp-content\/uploads\/2022\/08\/0x0-300x200.jpg 300w, https:\/\/cybersecuritynest.com\/wp-content\/uploads\/2022\/08\/0x0-1024x683.jpg 1024w, https:\/\/cybersecuritynest.com\/wp-content\/uploads\/2022\/08\/0x0-768x512.jpg 768w, https:\/\/cybersecuritynest.com\/wp-content\/uploads\/2022\/08\/0x0.jpg 1200w\" sizes=\"(max-width: 704px) 100vw, 704px\" \/><\/p>\n<p>Zero-day vulnerabilities are security weaknesses that are discovered by attackers or researchers before they are discovered by or can be fixed by the software manufacturer. Zero-day vulnerabilities frequently have available proof-of-concept exploits or are actively used in attacks.<\/p>\n<p>In order to patch two zero-day vulnerabilities that have reportedly been frequently exploited, Apple has now released macOS Monterey 12.5.1 and iOS 15.6.1\/iPadOS 15.6.1.<\/p>\n<p>&nbsp;<\/p>\n<p>This flaw allows a programme, such as malicious software, to run commands with kernel privileges. As the highest privilege level, a process would have full authority over the device at this level and could execute any command on it.<\/p>\n<p>&nbsp;<\/p>\n<p>The second zero-day flaw, CVE-2022-32893, is an out-of-bounds write flaw in WebKit, the web browser engine that powers Safari and other web-accessible applications.<\/p>\n<p>Apple claims that this weakness, which affects the web engine, could be remotely exploited by accessing a website that has been specially coded to facilitate arbitrary code execution by an attacker.<\/p>\n<p>The flaws were discovered by unidentified researchers, and Apple patched them in iOS 15.6.1, iPadOS 15.6.1, and macOS Monterey 12.5.1 by enhancing bounds checking for both flaws.<\/p>\n<p>The following gadgets are among those impacted by both vulnerabilities: Macs running macOS Monterey<br \/>\niPhone 6s and later, iPad Pro (all models), iPad Air 2, iPad 5th generation, iPad mini 4, and iPod touch 7th generation and later<\/p>\n<aside class=\"mashsb-container mashsb-main mashsb-stretched\"><div class=\"mashsb-box\"><div class=\"mashsb-buttons\"><a class=\"mashicon-facebook mash-large mash-center mashsb-noshadow\" href=\"https:\/\/www.facebook.com\/sharer.php?u=https%3A%2F%2Fcybersecuritynest.com%2F%3Fp%3D610\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Share&nbsp;on&nbsp;Facebook<\/span><\/a><a class=\"mashicon-twitter mash-large mash-center mashsb-noshadow\" href=\"https:\/\/twitter.com\/intent\/tweet?text=&amp;url=https:\/\/cybersecuritynest.com\/?p=610&amp;via=CYBERSECNEST\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Tweet&nbsp;on&nbsp;Twitter<\/span><\/a><a class=\"mashicon-subscribe mash-large mash-center mashsb-noshadow\" href=\"#\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Subscribe&nbsp;to&nbsp;Newsletter<\/span><\/a><div class=\"onoffswitch2 mash-large mashsb-noshadow\" style=\"display:none\"><\/div><\/div>\n            <\/div>\n                <div style=\"clear:both\"><\/div><\/aside>\n            <!-- Share buttons by mashshare.net - Version: 4.0.47-->","protected":false},"excerpt":{"rendered":"<p>In order to address two zero-day vulnerabilities that were previously used by hackers to break into iPhones, iPads, or Macs, Apple has today published emergency security patches. Zero-day vulnerabilities are security weaknesses that are discovered by attackers or researchers before they are discovered by or can be fixed by the software manufacturer. Zero-day vulnerabilities frequently [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":612,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[13,1,11],"tags":[162],"class_list":["post-610","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mobile","category-os","category-wml","tag-twitter"],"aioseo_notices":[],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/posts\/610"}],"collection":[{"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=610"}],"version-history":[{"count":1,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/posts\/610\/revisions"}],"predecessor-version":[{"id":613,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/posts\/610\/revisions\/613"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/media\/612"}],"wp:attachment":[{"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=610"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=610"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=610"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}