Description:
Apple has released iOS 15.7.8, iOS 16.6, iPadOS 15.7.8 and iPadOS 16.6 to fix the vulnerabilities in various Apple devices. The list of vulnerability information can be found at:
https://support.apple.com/en-us/HT213841
https://support.apple.com/en-us/HT213842
Reports indicate that multiple vulnerabilities (CVE-2023-32409, CVE-2023-37450 and CVE-2023-38606) are being actively exploited. Users are advised to take immediate action to patch your affected systems to mitigate the elevated risk of cyber attacks.
Affected Systems:
- iPhone 6s and later, SE (1st generation)
- iPad 5th generation and later, Air 2 and later, mini (4th generation) and later, Pro (all models)
- iPod touch (7th generation)
Impact:
Depending on the vulnerabilities being exploited, a successful exploitation could lead to arbitrary code execution, denial of service, information disclosure, privilege escalation, security restriction bypass, spoofing or tampering on an affected device.
Recommendation:
Apple has released new version of iOS and iPadOS to address the issue.
The updates can be obtained through the auto-update mechanism. Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
More Information:
- https://support.apple.com/en-us/HT213841
- https://support.apple.com/en-us/HT213842
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23540
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32381
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32409
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32416
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32433
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32437
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32441
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32734
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35993
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37450
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38136
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38261
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38410
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38424 (to CVE-2023-38425)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38565
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38580
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38593 (to CVE-2023-38595)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38603
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38606
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611