{"id":47938,"date":"2023-04-17T13:25:41","date_gmt":"2023-04-17T17:25:41","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=47938"},"modified":"2023-04-17T14:07:32","modified_gmt":"2023-04-17T18:07:32","slug":"ios-macos-vulnerabilities-april-2023","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/ios-macos-vulnerabilities-april-2023\/47938\/","title":{"rendered":"Update iOS and macOS right now \u2014 again!"},"content":{"rendered":"<p>No sooner had we written about vulnerabilities in both <a href=\"https:\/\/www.kaspersky.com\/blog\/ios-macos-nspredicate-class-of-bugs\/47513\/\" target=\"_blank\" rel=\"noopener nofollow\">Apple<\/a> and <a href=\"https:\/\/www.kaspersky.com\/blog\/nokoyawa-zero-day-exploit\/47788\/\" target=\"_blank\" rel=\"noopener nofollow\">Microsoft<\/a> operating systems, as well as in <a href=\"https:\/\/www.kaspersky.com\/blog\/samsung-exynos-vulnerabilities\/47586\/\" target=\"_blank\" rel=\"noopener nofollow\">Samsung Exynos chips<\/a>, allowing the hacking of smartphones without any action on the part of their owner, than news broke about a couple of very serious security holes in both iOS and macOS \u2014 besides the ones that attackers were already exploiting. The vulnerabilities are so critical that, to combat them, Apple rapidly released updates not only for the latest operating systems, but also for several previous versions. But let\u2019s take it step by step\u2026<\/p>\n<h2>Vulnerabilities in WebKit and IOSurfaceAccelerator<\/h2>\n<p>In total, two vulnerabilities were discovered. The first one \u2014 named <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-28205\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2023-28205<\/a> (threat level: \u201chigh\u201d [8.8\/10]) \u2014 concerns the <a href=\"https:\/\/en.wikipedia.org\/wiki\/WebKit\" target=\"_blank\" rel=\"nofollow noopener\">WebKit<\/a> engine, which is the basis of the Safari browser (and not only that; more details below). The essence of this vulnerability is that, using a specially made malicious page, the bad guys can execute arbitrary code on a device.<\/p>\n<p>The second vulnerability \u2014 <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-28206\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2023-28206<\/a> (threat level \u201chigh\u201d [8.6\/10]) \u2014 was discovered in the IOSurfaceAccelerator object. Attackers can use it to execute code with operating system core permissions. Thus, these two vulnerabilities can be used in combination: the first serves to initially penetrate the device so that the second can be exploited. The second, in turn, allows you to \u201cescape from the sandbox\u201d and do almost anything with the infected device.<\/p>\n<p>The vulnerabilities can be found in both macOS desktop operating systems and mobile ones: iOS, iPadOS and tvOS. Not only are the latest generations of these operating systems vulnerable, but previous ones are too, so Apple has released updates (one after the other) for a whole range of systems: macOS 11, 12 and 13, iOS\/iPadOS 15 and 16, and also tvOS 16.<\/p>\n<h2>Why these vulnerabilities are dangerous<\/h2>\n<p>The WebKit engine is the only browser engine that\u2019s allowed on Apple\u2019s mobile operating systems. Whichever browser you use on your iPhone, WebKit will still be used to render web pages (so any browser on iOS is essentially Safari).<\/p>\n<p>Moreover, the same engine is also used when web pages are opened from any other application. Sometimes it might not even look like a web page, but WebKit will still be involved in displaying it. That\u2019s why <a href=\"https:\/\/www.kaspersky.com\/blog\/always-update-safari-on-iphone\/44039\/\" target=\"_blank\" rel=\"noopener nofollow\">it\u2019s so important to promptly install any new updates related to Safari<\/a>, even if you mainly use a different browser such as Google Chrome or Mozilla Firefox.<\/p>\n<p>Vulnerabilities in WebKit, such as the one described above, make possible the so-called \u201czero-click\u201d infection of an iPhone, iPad or Mac. That is, the device is infected without any active action by the user \u2014 it\u2019s enough just to lure them to a specially made malicious site.<\/p>\n<p>Often, such vulnerabilities are exploited in <a href=\"https:\/\/www.kaspersky.com\/blog\/snow-white-cryptominers\/31987\/\" target=\"_blank\" rel=\"noopener nofollow\">targeted attacks<\/a> on powerful people or large organizations (although regular users can also get hit if they have the bad luck to land on an infected page). And it seems that something similar is happening in this case. As usual, Apple is not releasing any details, but <a href=\"https:\/\/twitter.com\/DonnchaC\/status\/1644414669254271006\" target=\"_blank\" rel=\"nofollow noopener\">by all accounts<\/a>, the chain of vulnerabilities described above is already being actively used by unknown attackers to install spyware.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/04\/17132001\/iOS-macOS-Vulnerabilities-01.jpg\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-47940\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/04\/17132001\/iOS-macOS-Vulnerabilities-01.jpg\" alt=\"The chain of vulnerabilities is already being actively used by unknown attackers\" width=\"887\" height=\"836\"><\/a><\/p>\n<p>Moreover, since CVE-2023-28205 and CVE-2023-28206 have already become public knowledge and a <a href=\"https:\/\/gist.github.com\/LinusHenze\/728db96a836b6817ecb727cfbde606b3\" target=\"_blank\" rel=\"nofollow noopener\">proof of concept has already been published<\/a> for the second vulnerability, it\u2019s likely that other cybercriminals will start to exploit them too.<\/p>\n<h2>How to protect yourself against the described vulnerabilities<\/h2>\n<p>Of course, the best way to protect against CVE-2023-28205 and CVE-2023-28206 is to promptly install the new Apple updates. Here\u2019s what you need to do, depending on the device in question:<\/p>\n<ul>\n<li>If you have one of the latest iOS, iPadOS or tvOS devices, then you should update the operating system to version <a href=\"https:\/\/support.apple.com\/HT213720\" target=\"_blank\" rel=\"nofollow noopener\">16.4.1<\/a>.<\/li>\n<li>If you own an older iPhone or iPad that no longer supports the latest OS, then you must update to version <a href=\"https:\/\/support.apple.com\/HT213723\" target=\"_blank\" rel=\"nofollow noopener\">15.7.5<\/a>.<\/li>\n<li>If your Mac is running the latest Ventura OS, then simply update to macOS <a href=\"https:\/\/support.apple.com\/HT213721\" target=\"_blank\" rel=\"nofollow noopener\">13.3.1<\/a>.<\/li>\n<li>If your Mac is running macOS Big Sur or Monterey, you\u2019ll need to update to macOS <a href=\"https:\/\/support.apple.com\/HT213725\" target=\"_blank\" rel=\"nofollow noopener\">11.7.6<\/a> or <a href=\"https:\/\/support.apple.com\/HT213724\" target=\"_blank\" rel=\"nofollow noopener\">12.6.5<\/a>, respectively, <strong>and also<\/strong>\u00a0<a href=\"https:\/\/support.apple.com\/HT213722\" target=\"_blank\" rel=\"nofollow noopener\">install a separate update for Safari<\/a>.<\/li>\n<\/ul>\n<p>And of course, don\u2019t forget to protect your Macs with <a href=\"https:\/\/www.kaspersky.com\/premium?icid=gl_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener nofollow\">reliable antivirus software<\/a> that can protect you against new vulnerabilities that haven\u2019t been fixed yet.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-geek\">\n","protected":false},"excerpt":{"rendered":"<p>Once again, very serious vulnerabilities have been found in Apple operating systems. Don&#8217;t delay updating to iOS 16.4.1 and macOS 13.3.1. Please note that updates are also available for iOS 15 and macOS 11 and 12.<\/p>\n","protected":false},"author":2726,"featured_media":47939,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2683],"tags":[14,1250,1946,534,714,121,268],"class_list":{"0":"post-47938","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-apple","9":"tag-ios","10":"tag-macos","11":"tag-safari","12":"tag-spyware","13":"tag-updates","14":"tag-vulnerabilities"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ios-macos-vulnerabilities-april-2023\/47938\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/ios-macos-vulnerabilities-april-2023\/25512\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/ios-macos-vulnerabilities-april-2023\/20944\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/ios-macos-vulnerabilities-april-2023\/28128\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/ios-macos-vulnerabilities-april-2023\/25818\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/ios-macos-vulnerabilities-april-2023\/26214\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/ios-macos-vulnerabilities-april-2023\/28696\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ios-macos-vulnerabilities-april-2023\/35116\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/ios-macos-vulnerabilities-april-2023\/20455\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/ios-macos-vulnerabilities-april-2023\/21122\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/ios-macos-vulnerabilities-april-2023\/30023\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/ios-macos-vulnerabilities-april-2023\/33613\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/ios-macos-vulnerabilities-april-2023\/26146\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ios-macos-vulnerabilities-april-2023\/31823\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ios-macos-vulnerabilities-april-2023\/31509\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/ios\/","name":"iOS"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/47938","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2726"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=47938"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/47938\/revisions"}],"predecessor-version":[{"id":47943,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/47938\/revisions\/47943"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/47939"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=47938"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=47938"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=47938"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}