{"id":23269,"date":"2023-10-30T17:11:30","date_gmt":"2023-10-31T01:11:30","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/10\/30\/news-16999\/"},"modified":"2023-10-30T17:11:30","modified_gmt":"2023-10-31T01:11:30","slug":"news-16999","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/10\/30\/news-16999\/","title":{"rendered":"Update now! Apple patches a raft of vulnerabilities"},"content":{"rendered":"\n<p>Apple has released security updates for its phones, iPads, Macs, watches and TVs.<\/p>\n<p>Updates are available for these products:<\/p>\n<ul>\n<li>iPhone XS and later, iPad Pro 12.9-inch 2nd generation and later, iPad Pro 10.5-inch, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 6th generation and later, and iPad mini 5th generation and later get&nbsp;<a href=\"https:\/\/support.apple.com\/kb\/HT213982\" target=\"_blank\" rel=\"noreferrer noopener\">iOS 17.1 or iPadOS 17.1<\/a>.<\/li>\n<li>iPhone 8 and later, iPad Pro (all models), iPad Air 3rd generation and later, iPad 5th generation and later, and iPad mini 5th generation and later get&nbsp;<a href=\"https:\/\/support.apple.com\/kb\/HT213981\" target=\"_blank\" rel=\"noreferrer noopener\">iOS 16.7.2 or iPadOS 16.7.2<\/a>.<\/li>\n<li>iPhone 6s (all models), iPhone 7 (all models), iPhone SE (1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch (7th generation) get&nbsp;<a href=\"https:\/\/support.apple.com\/kb\/HT213990\" target=\"_blank\" rel=\"noreferrer noopener\">iOS 15.8 or iPadOS 15.8<\/a>.<\/li>\n<li>Macs get one of&nbsp;<a href=\"https:\/\/support.apple.com\/kb\/HT213984\" target=\"_blank\" rel=\"noreferrer noopener\">macOS Sonoma 14.1<\/a>,&nbsp;<a href=\"https:\/\/support.apple.com\/kb\/HT213985\" target=\"_blank\" rel=\"noreferrer noopener\">macOS Ventura 13.6.1<\/a>,&nbsp;<a href=\"https:\/\/support.apple.com\/kb\/HT213983\" target=\"_blank\" rel=\"noreferrer noopener\">macOS Monterey 12.7.1<\/a>, and&nbsp;<a href=\"https:\/\/support.apple.com\/kb\/HT213986\" target=\"_blank\" rel=\"noreferrer noopener\">Safari 17.1<\/a>.<\/li>\n<li>Apple TV HD and Apple TV 4K (all models) get&nbsp;<a href=\"https:\/\/support.apple.com\/kb\/HT213987\" target=\"_blank\" rel=\"noreferrer noopener\">tvOS 17.1<\/a>.<\/li>\n<li>Apple Watch Series 4 and later get&nbsp;<a href=\"https:\/\/support.apple.com\/kb\/HT213988\" target=\"_blank\" rel=\"noreferrer noopener\">watchOS 10.1<\/a>.<\/li>\n<\/ul>\n<p>The important vulnerabilities that have been addressed in this raft of updates are:<\/p>\n<p><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2023-40423\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-40423<\/a>, a critical vulnerability in IOTextEncryptionFamily that could allow an app to execute arbitrary code with kernel privileges. Arbitrary code execution means an&nbsp;attacker could run any commands or code of their choice on a target machine&nbsp;or in a target process. Kernel privileges means the attacker would have the highest level of access to all machine resources.<\/p>\n<p><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2023-40413\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-40413<\/a>, a vulnerability in Find My that could allow another to read sensitive location information.<\/p>\n<p><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2023-40416\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-40416<\/a>, a vulnerability in ImageIO which means processing an image could result in disclosure of process memory.<\/p>\n<p><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2023-42847\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-42847<\/a>, a vulnerability in Passkeys could allow an attacker to access passkeys without authentication.&nbsp;A&nbsp;passkey&nbsp;is a way to sign in to an app or website account, without needing to create and remember a password.<\/p>\n<p><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2023-42841\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-42841<\/a>, a vulnerability in Pro Res could allow an app to execute arbitrary code with kernel privileges.<\/p>\n<p><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2023-41982\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-41982<\/a>,&nbsp;<a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2023-41997\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-41997<\/a>, and&nbsp;<a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2023-41988\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-41988<\/a>&nbsp;are a set of vulnerabilities in Siri that would allow an attacker with physical access to use Siri to access sensitive user data.<\/p>\n<p><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2023-40447\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-40447<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2023-42852\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-42852<\/a>&nbsp;are vulnerabilities in WebKit that could be used for arbitrary code execution. Visiting a specially crafted website could cause WebKit to perform operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.<\/p>\n<p><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2023-32434\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-32434<\/a>&nbsp;is a vulnerability that could allow an app to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.<\/p>\n<p><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2023-41989\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-41989<\/a>&nbsp;could allow an attacker to execute arbitrary code as root from the Lock Screen due to a vulnerability in Emoji. The issue was addressed by restricting options offered on a locked device.&nbsp;Root&nbsp;is the superuser account in many opeating systems. It is a user account for administrative purposes, and typically has the highest access rights on the system.<\/p>\n<p><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2023-38403\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-38403<\/a>&nbsp;is a vulnerability in iperf3 before 3.14 that could allow peers to cause an integer overflow and heap corruption via a crafted length field. iPerf3 is a tool for active measurements of the maximum achievable bandwidth on IP networks.&nbsp;An integer overflow is a programming error that allows an attacker to manipulate a number the program uses in a way that might be harmful. If the number is used to set the length of a data buffer (an area of memory used to hold data), an integer overflow can lead to a buffer overflow, a vulnerability that allows an attacker to overloaded a buffer with more data than it&#8217;s expecting, which creates a route for the attacker to manipulate the program. Heap corruption occurs when a program modifies the contents of a memory location outside of the memory allocated to the program. The outcome can be relatively benign and cause a memory leak, or it may be fatal and cause a memory fault, usually in the program that causes the corruption.<\/p>\n<p><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2023-42856\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-42856<\/a>&nbsp;could be used to trigger unexpected app termination or arbitrary code execution due to a vulnerability in Model I\/O.&nbsp;Model I\/O&nbsp;provides&nbsp;the ability to access and manage 3D&nbsp;models.<\/p>\n<p><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2023-40404\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-40404<\/a>&nbsp;could allow an app to execute arbitrary code with kernel privileges due to a vulnerability in Networking.<\/p>\n<p><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2023-41977\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-41977<\/a>&nbsp;is a vulnerability in Safari that could allow a malicious website to reveal browsing history.<\/p>\n<p>Notably absent from the bugs that have been fixed is&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/10\/ileakage\">iLeakage<\/a>, a sophisticated side-channel attack in the Spectre family.<\/p>\n<p>The updates above may already have reached you, but it doesn&#8217;t hurt to check if your device is at the&nbsp;<a href=\"https:\/\/support.apple.com\/en-us\/HT201222\" target=\"_blank\" rel=\"noreferrer noopener\">latest update level<\/a>. If a Safari update is available for your device, you can get it by updating or upgrading&nbsp;<a href=\"https:\/\/support.apple.com\/en-us\/HT204204\" target=\"_blank\" rel=\"noreferrer noopener\">your iPhone or iPad<\/a>&nbsp;or your<a href=\"https:\/\/support.apple.com\/en-us\/HT201541\" target=\"_blank\" rel=\"noreferrer noopener\">&nbsp;Mac<\/a>.<\/p>\n<hr class=\"wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide\" \/>\n<p><strong>We don\u2019t just report on vulnerabilities\u2014we identify them, and prioritize action.<\/strong><\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Keep vulnerabilities in tow by using&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/business\/vulnerability-patch-management\">Malwarebytes Vulnerability and Patch Management<\/a>.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/10\/update-now-apple-patched-many-vulnerabilities-but-ileakage-remains\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Apple has released security updates for its phones, iPads, Macs, watches and TVs. Updates are available for these products: The important&#8230; <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[29643,30413,30415,30402,30403,30404,30410,30416,30407,30409,30412,30408,30405,30406,30411,30414,22783,30401,32,10543,29667,30417],"class_list":["post-23269","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-cve-2023-32434","tag-cve-2023-38403","tag-cve-2023-40404","tag-cve-2023-40413","tag-cve-2023-40416","tag-cve-2023-40423","tag-cve-2023-40447","tag-cve-2023-41977","tag-cve-2023-41982","tag-cve-2023-41988","tag-cve-2023-41989","tag-cve-2023-41997","tag-cve-2023-42487","tag-cve-2023-42841","tag-cve-2023-42852","tag-cve-2023-42856","tag-exploits-and-vulnerabilities","tag-ileakage","tag-news","tag-safari","tag-side-channel","tag-vim"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23269","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23269"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23269\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23269"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23269"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23269"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}