Apple has released security updates to address three zero-day vulnerabilities that are actively being exploited in attacks targeting iPhones, Macs, and iPads.
The vulnerabilities, known as CVE-2023-32409, CVE-2023-28204, and CVE-2023-32373, are found in the WebKit browser engine. CVE-2023-32409 allows remote attackers to break out of the Web Content sandbox, while CVE-2023-28204 exposes sensitive information through processing web content, and CVE-2023-32373 enables arbitrary code execution through processing malicious web content.
Apple acknowledges reports of active exploitation of these vulnerabilities, and they are likely being exploited by nation-state actors or surveillance firms.
To address these issues, Apple has released updates including iOS and iPadOS 16.5, tvOS 16.5, watchOS 9.5, Safari 16.5, and macOS Ventura 13.4.
Initially, Apple had addressed CVE-2023-28204 and CVE-2023-32373 with Rapid Security Response (RSR) patches for iOS 16.4.1 and macOS 13.3.1 on May 1. Since the beginning of 2023, Apple has addressed a total of six zero-day vulnerabilities that were actively exploited.
Additionally, in February, emergency security updates were released for CVE-2023-23529, a WebKit zero-day vulnerability that allowed arbitrary code execution. In April, Apple addressed two more actively exploited zero-day vulnerabilities, namely CVE-2023-28205 and CVE-2023-28206, which impacted various Apple devices.
These security updates highlight Apple’s commitment to promptly addressing security concerns and protecting its users from actively exploited vulnerabilities.
Users are strongly encouraged to install the updates to ensure the security of their devices and mitigate the risk of potential attacks leveraging these zero-day vulnerabilities.