Apple backports fixes for CVE-2022-42827 zero-day to older iPhones, iPads
Apple released updates to backport the recently released security patches for CVE-2022-42827 zero-day to older iPhones and iPads.
Apple has released new security updates to backport security patches released this week to address actively exploited CVE-2022-42827 in older iPhones and iPads, addressing an actively exploited zero-day bug.
Early this week, Apple addressed the ninth zero-day vulnerability exploited in attacks in the wild since the start of the year. The CVE-2022-42827 vulnerability is an out-of-bounds write issue that can be exploited by an attacker to execute arbitrary code with kernel privileges.
The flaw was reported to Apple by an anonymous researcher, the company addressed it with improved bounds checking in iOS 16.1 and iPadOS 16.
“Apple is aware of a report that this issue may have been actively exploited.” reads the advisory published by Apple.
The vulnerability impacts iPhone 8 and later, iPad Pro (all models), iPad Air 3rd generation and later, iPad 5th generation and later, iPad mini 5th generation and later.
Apple released updates to address the zero-day issue in iOS 15.7.1 and iPadOS 15.7.1.
The flaw impacts iPhone 6s and later, iPad Pro (all models), iPad Air 2 and later, iPad 5th generation and later, iPad mini 4 and later, and iPod touch (7th generation).
Apple has addressed other eight zero-day vulnerabilities since January, below is the list of fixed issues:
- January 2022: CVE-2022-22587 and CVE-2022-22594.
- February 2022: CVE-2022-22620.
- March 2022: CVE-2022-22674 and CVE-2022-22675.
- May 2022: CVE-2022-22675
- August 2022: CVE-2022-32894
- September 2022: CVE-2022-32917.
Follow me on Twitter: @securityaffairs and Facebook
|
Pierluigi Paganini
(SecurityAffairs – hacking, CVE-2022-42827)
The post Apple backports fixes for CVE-2022-42827 zero-day to older iPhones, iPads appeared first on Security Affairs.
If you like the site, please consider joining the telegram channel or supporting us on Patreon using the button below.