Update Your iOS Devices Now — 3 Actively Exploited 0-Days Discovered

Apple iOS Security Update

Apple on Thursday released multiple security updates to patch three zero-day vulnerabilities that were revealed as being actively exploited in the wild.

Rolled out as part of its iOS, iPadOS, macOS, and watchOS updates, the flaws reside in the FontParser component and the kernel, allowing adversaries to remotely execute arbitrary code and run malicious programs with kernel-level privileges.

The zero-days were discovered and reported to Apple by Google’s Project Zero security team.

“Apple is aware of reports that an exploit for this issue exists in the wild,” the iPhone maker said of the three zero-days without giving any additional details so as to allow a vast majority of users to install the updates.

The list of impacted devices includes iPhone 5s and later, iPod touch 6th and 7th generation, iPad Air, iPad mini 2 and later, and Apple Watch Series 1 and later.

The fixes are available in versions iOS 12.4.9 and 14.2, iPadOS 14.2, watchOS 5.3.9, 6.2.9, and 7.1, and as a supplemental update for macOS Catalina 10.15.7.

According to Apple’s security bulletin, the flaws are:

  • CVE-2020-27930: A memory corruption issue in the FontParser library that allows for remote code execution…

http://feedproxy.google.com/~r/TheHackersNews/~3/RXY5zZp6Plg/update-your-ios-devices-now-3-actively.html

Update Your iOS Devices Now — 3 Actively Exploited 0-Days Discovered 1
Update Your iOS Devices Now — 3 Actively Exploited 0-Days Discovered 2
Update Your iOS Devices Now — 3 Actively Exploited 0-Days Discovered 3
Update Your iOS Devices Now — 3 Actively Exploited 0-Days Discovered 4

Have a comment? Type it below!