Security News > 2023 > October > Apple patches another iOS zero-day under attack (CVE-2023-42824)
Apple has released a security update for iOS and iPadOS to fix another zero-day vulnerability exploited in the wild.
"Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.6," the company stated.
The company addressed the vulnerability by releasing iOS 17.0.3 and iPadOS 17.0.3 updates, which also cover CVE-2023-5217 - a buffer overflow vulnerability in vp8 encoding in the libvpx video codec library that could allow arbitrary code execution.
Both vulnerabilities were reported by Citizen Lab and have been fixed in both the iOS 16 and iOS 15 branches.
In late September, Citizen Lab together with Google TAG reported three more zero-day vulnerabilities affecting iOS devices.
Apple has addressed these issues in iOS 17 and has also made updates to Lockdown Mode, a security feature that offers additional protection to high-risk users.
- Apple fixes first zero-day bug exploited in attacks this year (source)
- CISA Flags 6 Vulnerabilities - Apple, Apache, Adobe , D-Link, Joomla Under Attack (source)
- Ivanti warns of Connect Secure zero-days exploited in attacks (source)
- Citrix warns of new Netscaler zero-days exploited in attacks (source)
- AMD, Apple, Qualcomm GPUs leak AI data in LeftoverLocals attacks (source)
- Apple Issues Patch for Critical Zero-Day in iPhones, Macs - Update Now (source)
- Apple fixes actively exploited WebKit zero-day (CVE-2024-23222) (source)
- Ivanti warns of new Connect Secure zero-day exploited in attacks (source)
- CISA Warns of Active Exploitation Apple iOS and macOS Vulnerability (source)
| Out-of-bounds Write vulnerability in multiple products
Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.