Apple fixes another zero-day used to deploy NSO iPhone spyware

3 years ago 249
BOOK THIS SPACE FOR AD
ARTICLE AD

Apple fixes another zero-day used to deploy NSO iPhone spyware

Apple has released security updates to fix three zero-day vulnerabilities exploited in the wild by attackers to hack into iPhones and Macs running older iOS and macOS versions.

Based on the info shared by Apple in today's security advisories [12] at least one of the bugs (reported by The Citizen Lab) was likely used to deploy NSO Pegasus spyware on hacked devices.

The three security flaws are tracked as CVE-2021-30860 (in the CoreGraphics framework), CVE-2021-30858 (in the WebKit browser engine), and CVE-2021-30869 (in the XNU operating system kernel), and they were reported by Citizen Lab, Google, and anonymous security researchers.

Successful exploitation of any of these bugs leads to arbitrary code execution on compromised devices, with kernel privileges if the abused zero-day is the one found in XNU.

"Apple is aware of a report that this issue may have been actively exploited," Apple said when describing the three zero-day vulnerabilities.

The complete list of impacted devices includes:

iPhone 5s, iPhone 6, iPhone 6 Plus, iPad Air, iPad mini 2, iPad mini 3, and iPod touch (6th generation) running iOS 12.5.5 and Macs with Security Update 2021-006 Catalina.

0day privilege escalation for macOS Catalina discovered in the wild by @eryeh https://t.co/yvCWPo45fL

We saw this used in conjunction with a N-day remote code execution targeting webkit.

Thanks to Apple for getting patch out so quickly.

— Shane Huntley (@ShaneHuntley) September 23, 2021

Long stream of zero-days exploited in the wild

Besides today's three zero-days, Apple had to deal with what looks like an unending stream of zero-day bugs used in attacks targeting iOS and macOS devices:

two zero-days earlier this month, one of them used also used to install Pegasus spyware on iPhones, the FORCEDENTRY exploit disclosed in August (previously tracked by Amnesty Tech as Megalodon), three iOS zero-days (CVE-2021-1870, CVE-2021-1871, CVE-2021-1872) in February, exploited in the wild and reported by anonymous researchers, an iOS zero-day (CVE-2021-1879) in March that may have also been actively exploited, one zero-day in iOS (CVE-2021-30661) and one in macOS (CVE-2021-30657) in April, exploited by Shlayer malware, three other iOS zero-days (CVE-2021-30663, CVE-2021-30665, and CVE-2021-30666) in May, bugs allowing for arbitrary remote code execution (RCE) simply by visiting malicious websites, a macOS zero-day (CVE-2021-30713) in May, which was abused by the XCSSET malware to bypass Apple's TCC privacy protection, two iOS zero-day bugs (CVE-2021-30761 and CVE-2021-30762) in June that "may have been actively exploited" to hack into older iPhone, iPad, and iPod devices.
Read Entire Article