Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Apple reveals two iOS zero-day vulnerabilities that allow attackers to access fully patched devices
https://techxplore.com ^ | MAY 4, 2021 | by Sarah Katz

Posted on 05/05/2021 11:15:11 AM PDT by Red Badger

One week after Apple carried out its largest iOS and iPad update since September 2020's version 14.0 release, the company has followed up with a new patch for two zero-day vulnerabilities that let hackers execute malicious code on fully updated devices. Additionally, the new release of 14.5.1 also mitigates issues with a bug in the recent App Tracking Transparency feature included in the previous version.

Both of these vulnerabilities are located in the browser engine Webkit, which provides web content for App Store, Mail and Safari as well as other various apps running on iOS, Linux and macOS. Apple described this attack as the processing of maliciously crafted web content resulting in arbitrary code execution. As of now, these two zero-days have been patched.

So far, Apple has issued a notice that these vulnerabilities may have already been exploited. The company has also announced that the second zero-day was discovered by Chinese security research firm Qihoo 360, whereas an anonymous source reported the first vulnerability. At this time, Apple has yet to offer details regarding who is carrying out the exploits or who faces a risk of exploitation.

Google's Project Zero vulnerability research team has assessed that these three new vulnerabilities make the total number of seven actively exploited Apple zero-days. In fact, out of 22 zero-days discovered in 2021 alone, nearly 33 percent have targeted Apple mobile OS. This makes iOS the software most targeted by zero-day after Chrome.

Since these vulnerabilities have been patched, Facebook has taken some issue due to the new security restrictions not allowing the Facebook app to track user activity across other installed applications without explicit user permission. Furthermore, another bug may cause graying out of the App Tracking Transparency toggle in the settings menu, even after users have updated to iOS 14.5.1.

Overall, Apple security and vulnerability research teams emphasize that these types of zero-days pose such a threat to both defenders and users due to the lack of knowledge surrounding their presence. After all, if hackers manage to execute evil code or access a privileged system before incident responders and researchers even realize the vulnerabilities in question exist, the attackers can steal a plethora of data, causing potentially immeasurable damage.

Alongside patches for the discovered vulnerabilities, Apple has also confirmed a patch for the App Tracking Transparency feature bug. This fix will enable users to once again opt out of ad tracking on their Apple devices.

Explore further

Apple urges security upgrade to iPhones, iPads

More information:

support.apple.com/en-us/HT212336 support.apple.com/en-us/HT212335 support.apple.com/en-us/HT212339


TOPICS:
KEYWORDS: apple; ios; securityupdate
Navigation: use the links below to view more comments.
first previous 1-2021-27 last
To: Garth Tater

I’m intrigued with this approach but not quite ready to take the plunge. Will monitor for sure.


21 posted on 05/05/2021 2:36:56 PM PDT by FreedomPoster (Islam delenda est)
[ Post Reply | Private Reply | To 20 | View Replies]

To: FreedomPoster

The latest iteration is just now becoming what I would consider to be usable but it is moving ahead quickly. Maybe another year or so before it hits the “good enough” zone and starts being a threat to the big boys.


22 posted on 05/05/2021 2:58:39 PM PDT by Garth Tater (What's mine is mine.)
[ Post Reply | Private Reply | To 21 | View Replies]

To: Red Badger; ~Kim4VRWC's~; 1234; 5thGenTexan; AbolishCSEU; Abundy; Action-America; acoulterfan; ...
Apple issues a patch update to iOS 15.4 to cover two zero day vulnerabilities found in WebKit that affects iOS, iPadOS and MacOS browsers, Mail, and other browsers that use the WebKit framework. This is not something that was actually introduced with the release of iOS or iPadOS 15.4 but a new vulnerability that was just revealed. There are no current exploits in the wild that take advantage of this vulnerability and the apps they could exploit are sandboxed. Users should update their systems to patch WebKit to avoid this possibility. Linux users and many other open source browsers also use Apple’s WebKit framework. —PING!


APPLE iOS, iPadOS, MacOS, WebKit Security update PING!

If you want on or off the Apple/Mac/iOS Ping List, Freepmail me.

23 posted on 05/06/2021 7:48:56 AM PDT by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplophobe bigot!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

They are patching a patch that patched a previous patch?..................


24 posted on 05/06/2021 7:50:19 AM PDT by Red Badger (Jesus said there is no marriage in Heaven. That's why they call it Heaven.....................)
[ Post Reply | Private Reply | To 23 | View Replies]

To: Red Badger
They are patching a patch that patched a previous patch?..................

That occurs more often than you might think. A patch that was released gets forgotten in a latter patch. I’ve seen it several times. But I don’t think that is the case this time., Sometimes an update just breaks something that needs fixing. i don’t think hat the case here either, but it might be with the heightened scrutiny of MacOS with it running on a modified ARM with M1 processors.

25 posted on 05/06/2021 8:29:35 AM PDT by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplophobe bigot!)
[ Post Reply | Private Reply | To 24 | View Replies]

To: Swordmaker

Thanks, Installing now.


26 posted on 05/06/2021 9:17:26 AM PDT by Shady (Prince Andrew must be dethroned...And who killed Ashli Babbitt? )
[ Post Reply | Private Reply | To 23 | View Replies]

To: Swordmaker

Hey bro, I am proud owner of a new iPhone 12. 😀👍


27 posted on 05/06/2021 9:46:08 AM PDT by Mark17 (Father of US Air Force combat pilot )
[ Post Reply | Private Reply | To 23 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-27 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson