Security News > 2021 > September > Apple products vulnerable to FORCEDENTRY zero-day attack – patch now!

Apple products vulnerable to FORCEDENTRY zero-day attack – patch now!
2021-09-14 18:45

Intriguingly, Apple also fixed another in-the-wild bug at the same time, dubbed CVE-2021-30858.

Even browsers such as Edge and Firefox, which usually use the Chromium and Gecko web rendering software respectively, have to use via WebKit instead, so WebKit security bugs can have widespread consequences on iPhones and iPads.

The CVE-2021-30858 bug is a use-after-free vulnerability, where a program hands back to the operating system memory that it no longer needs, so it can be used elsewhere.

With two apparently independent bugs in the wild at the same time, with little indication so far of what to watch out for in booby trapped PDF files or web pages, there's not much you can do.

HT212807: iOS 14.8 and iPadOS 14.8, fixing both bugs.

As far as we can tell, the Citizen Lab bug affects "All iPhones with iOS versions prior to 14.8", which we assume includes iOS 12, still officially supported by Apple.


News URL

https://nakedsecurity.sophos.com/2021/09/14/apple-products-vulnerable-to-forcedentry-zero-day-attack-patch-now/

Related Vulnerability

DATE CVE VULNERABILITY TITLE RISK
2021-08-24 CVE-2021-30858 Use After Free vulnerability in multiple products
A use after free issue was addressed with improved memory management.
network
low complexity
apple fedoraproject debian CWE-416
8.8

Related vendor

VENDOR LAST 12M #/PRODUCTS LOW MEDIUM HIGH CRITICAL TOTAL VULNS
Apple 135 565 4108 1570 2442 8685