Apple released updates to backport security patches that address actively exploited CVE-2023-23529 WebKit zero-day for older iPhones and iPads.
Apple released security updates to backport patches that address an actively exploited zero-day flaw (CVE-2023-23529) for older iPhones and iPads.
The CVE-2023-23529 flaw is a type confusion issue in WebKit that was addressed by the IT giant with improved checks. The flaw impacts iOS, iPadOS, and macOS.
Apple addressed the vulnerability in February and US CISA added the issue to its Known Exploited Vulnerabilities Catalog on February 14, 2023.
An attacker can trick the victim into visiting malicious web pages to trigger the vulnerability and cause OS crashes or potentially gain arbitrary code execution on vulnerable devices.
“Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.” reads the advisory published by Apple.
Now Apple released security updates to fix the issue in iOS 15.7.4 and iPadOS 15.7.4.
The vulnerability impacted iPhone 6s (all models), iPhone 7 (all models), iPhone SE (1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch (7th generation) devices.
In January, Apple backported the security updates for another zero-day vulnerability, tracked as CVE-2022-42856, to older iPhones and iPads.
To secure older devices against attacks exploiting the above issue, Apple released iOS 12.5.7. The patches are now available also for iPhone 5s, iPhone 6, iPhone 6 Plus, iPad Air, iPad mini 2, iPad mini 3, and iPod touch (6th generation).
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
(SecurityAffairs – hacking, Apple)
The post Apple fixes recently disclosed CVE-2023-23529 zero-day on older devices appeared first on Security Affairs.