Apple Discloses Two Zero-Day Exploits: What You Need to Know

Apple Discloses Two Zero-Day Exploits: What You Need to Know

Apple’s September 2023 Zero-Day Exploit and Updates

If you have not already, we strongly urge you to update your iPhone to the latest available firmware. Within the last day, Apple had rolled out an announcement making it known to its users that they have been breached by an attacker who had gained access to targeted devices through a zero-day exploit. These vulnerabilities were all exploited in targeted attacks, meaning that they were not used to infect a large number of devices. However, they are still a serious threat, as they could be used to gain control of a victim’s device and steal their data.

Recent Zero-Day Exploits Patched by Apple

As of Sept. 8, 2023, Apple has identified 13 zero-dat vulnerabilities. These vulnerabilities, which often lead to attacks, hold the potential power to commandeer control of devices and/or extract sensitive data. The two vulnerabilities are as followed:

  • CVE-2023-41061 – A validation issue in Wallet that could result in arbitrary code execution when handling a maliciously crafted attachment.
  • CVE-2023-41064 – A buffer overflow issue in the Image I/O component that could result in arbitrary code execution when processing a maliciously crafted image.

Attacks like these are not uncommon and certainly something you need to be aware of (as a potential threat). These attacks were carried out with zero interaction on the behalf of the device owner.

Moving Forward?

We always suggest to users, regardless of the device they use, to keep their software up to date. Reason being? For scenarios exactly like this. While individuals may not be a likely target of the attack, you are much better safe than sorry.

To update to the latest firmware, follow these few simple steps:

  1. Tap on the “Settings” icon on your home screen.
  2. Scroll down and select “General.”
  3. Tap on “Software Update.” Your iPhone will check for available updates.
  4. If an update is available, tap “Download and Install.” You might be prompted to enter your passcode.

Some Other Ways to Stay Safe

  • Use a strong password and enable two-factor authentication for all of your online accounts.
  • Be careful about what links you click on and what attachments you open.
  • Use a security solution like antivirus software or a firewall.

To read more articles similar to this, check out our other posts here: https://propersky.com/insights/

No Comments

Post A Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Join Our Webinar

ENDING THE EMAIL NIGHTMARE: SECURITY STRATEGIES TO FORTIFY YOUR INBOX now.

All it takes is one bad email to get through to the wrong user and your business is at serious risk. Email phishing attacks are by far still the #1 culprit of Ransomware and successful data breach on small businesses.

Imagine your inbox as the gates to your castle. Would you leave the doors wide open for your enemies? Let’s transform your business into a secure fortress and together put an end to this email nightmare once and for all!

Watch the Recording Now!

Free Expert Consultation

  • Hidden
  • This field is for validation purposes and should be left unchanged.