Description:
Apple has released iOS 15.7.1, iOS 16.1, iPadOS 15.7.1 and iPadOS 16 to fix the vulnerabilities in various Apple devices. The list of vulnerability information can be found at:
https://support.apple.com/en-us/HT213489
https://support.apple.com/en-us/HT213490
Apple has released iOS 15.7.1 and iPadOS 15.7.1 to address the vulnerability (CVE-2022-42827) in the Apple devices that are unable to update to iOS 16 and iPadOS 16. You are advised to take immediate action to patch your affected systems to mitigate the elevated risk of cyber attacks.
Reports indicate that the vulnerability (CVE-2022-42827) is being actively exploited in the wild. You are advised to take immediate action to patch your affected systems to mitigate the elevated risk of cyber attacks.
Affected Systems:
- iPhone 6s and later
- iPad 5th generation and later, Air 2 and later, mini 4 and later, Pro (all models)
- iPod touch (7th generation)
Impact:
A successful exploitation could lead to arbitrary code execution, denial of service, information disclosure, security restriction bypass, spoofing or tampering on an affected device.
Recommendation:
Apple has released new version of iOS and iPadOS to address the issue.
The updates can be obtained through the auto-update mechanism. Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
More Information:
- https://support.apple.com/en-us/HT213489
- https://support.apple.com/en-us/HT213490
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32922 (to CVE-2022-32924)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32926 (to CVE-2022-32927)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32929
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32932
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32935
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32938 (to CVE-2022-32941)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32944
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32946 (to CVE-2022-32947)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32949
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37434
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42798 (to CVE-2022-42801)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42803
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42806
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42808
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42810 (to CVE-2022-42811)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42813
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42817
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42820
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42823 (to CVE-2022-42825)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42827
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42829 (to CVE-2022-42832)