Security

Patches

Apple patches all the iThings, including iOS 15 hole under attack right now

Issue identified in February but owners of older kit weren't warned


Happy belated Patch Tuesday from Cupertino: Apple has issued security updates for almost every piece of code it slings - including a fix for a vulnerability in older iOS devices the iGiant believes is under attack right now.

The actively exploited flaw, which is now patched on iOS and iPadOS 15, is in the WebKit engine: CVE-2023-23529 is a type confusion issue that could allow malicious web content to execute arbitrary code on vulnerable devices. "Apple is aware of a report that this issue may have been actively exploited," Cupertino commented. 

That means those vulnerable iPhones and iPads could be hijacked by malicious webpages on the internet, a hole someone has been abusing, so update your stuff as soon as you can. The fix is available for iPhone 6s (all models), iPhone 7 (all models), iPhone SE (1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch (7th generation).

Patches were also published this week for separate flaws Apple's Studio Display firmware, and Safari 16.4 on macOS Big Sur and Monterey, plus separate security patches for macOSes Big Sur and Monterey and Ventura, iOS 16.4, WatchOS 9.4, and tvOS 16.4.

Suffice it to say, if you own an Apple product it's a good idea to get these updates installed ASAP. That said, Apple users are usually better than most about being fully patched since there's only a single manufacturer to push out updates, compared to the more fractured Android landscape.

WebKit vuln needs an urgent patch

The US government's Cybersecurity and Infrastructure Security Agency (CISA) logged the WebKit type confusion flaw in its Known Exploited Vulnerabilities Catalog on February 14, a day after Apple patched the issue in macOS Ventura, Safari 16 on macOSes Big Sur and Monterey, and iOS 16. Crucially, back then, Apple knew the WebKit hole was under active attack.

In its entry for the exploit, the National Institute of Standards and Technology gave it a CVSS severity rating of 8.8 out of 10, which is quite high. This raises the question of why Apple decided to wait more than a month before providing this update to the previous version of iOS, which was superseded by iOS 16 in September of last year.

We asked Apple for an explanation as to why it left 20 percent of iPhones and more than a quarter of the iPads in circulation without a critical security patch for an active exploit for over a month, and didn't receive an answer.

One answer may lie in January's patch bundle from Apple, which included a fix for a similar WebKit flaw which was also under active attack for iOS 12 users. Occam's (sometimes inaccurate) Razor would suggest the two cases may be linked.

As we noted in 2021 when iOS 15 was released, Apple told users it would make updating their devices to the latest version of iOS an optional decision - at least for some time. 

"You can update to the latest version of iOS 15 as soon as it's released for the latest features and most complete set of security updates. Or continue on iOS 14 and still get important security updates until you're ready to upgrade to the next major version," Apple said in the iOS 15 release notes.

Apple later backtracked and forced users to update to iOS 15 in January 2022. Apple made similar upgrade concessions for users running iOS 15 whose devices are iOS 16 compatible, though in January it changed its tune on the 15/16 split, and is only issuing security updates for iOS 15 on devices that don't support iOS 16, which is reflected in the iOS 15 patch notes issued yesterday. In other words, if your Apple device can run the latest OS, Cupertino really wants you on it.

Only iPhone 6s, iPhone 7, 1st gen iPhone SE, iPad Air 2, 4th gen iPad mini and 7th generation iPod touch are eligible to install iOS 15.7.4; if that's you, patch now, otherwise it's time to finally upgrade. ®

Send us news
11 Comments

Goldman sacked: Apple 'wants out' of credit card collab

Don't be too shocked: Financial giant has been fleeing normie banking lately after failing to find footing

US senator claims Google and Apple reveal push notification data to foreign govs

Cupertino promises to reveal its data deliveries, ending silence on the matter

Steve Jobs' $4.01 RadioShack check set to fetch small fortune at auction

Talk about inflation – bids are now closing in on $30K

Apple slaps patch on WebKit holes in iPhones and Macs amid fears of active attacks

Two CVEs can be abused to steal sensitive info or execute code

A year on, CISA realizes debunked vuln actually a dud and removes it from must-patch list

Apparently no one thought to check if this D-Link router 'issue' was actually exploitable

EU lawmakers finalize cyber security rules that panicked open source devs

PLUS: Montana TikTok ban ruled unconstitutional; Dollar Tree employee data stolen; critical vulnerabilities

UK and US lead international efforts to raise AI security standards

17 countries agree to adopt vision for artificial intelligence security as fears mount over pace of development

Yet another UK public sector data blab, this time info of pregnant women, cancer patients

NHS Trust admits highly sensitive data left online for nearly three years

Buggy app for insulin-delivery device puts diabetes patients at risk of hypoglycemia

No fix available yet for over 100,000 Omnipod 5 customers

BlackCat ransomware crims threaten to directly extort victim's customers

Accounting software firm Tipalti says it’s investigating alleged break-in of its systems

UK government denies China/Russia nuke plant hack claim

Report suggests Sellafield compromised since 2015, response seems worryingly ignorant of Stuxnet

Today's 'China is misbehaving online' allegations come from Google, Meta

Zuck boots propagandists, Big G finds surge of action directed at Taiwan