Description:
Apple has released iOS 15.7.4, iOS 16.4, iPadOS 15.7.4 and iPadOS 16.4 to fix the vulnerabilities in various Apple devices. The list of vulnerability information can be found at:
https://support.apple.com/en-us/HT213673
https://support.apple.com/en-us/HT213676
Further to the High Threat Security Alert (A23-02-11), Apple has released iOS 15.7.4 and iPadOS 15.7.4 to address an arbitrary code execution vulnerability (CVE-2023-23529) in the Apple devices that are unable to update to iOS 16 and iPadOS 16. Users are advised to take immediate action to patch your affected systems to mitigate the elevated risk of cyber attacks.
Affected Systems:
- iPhone 6s and later, SE (1st generation)
- iPad 5th generation and later, Air 2 and later, mini 4 and later, Pro (all models)
- iPod touch (7th generation and later)
Impact:
Depending on the vulnerability exploited, a successful exploitation could lead to arbitrary code execution, denial of service, information disclosure, privilege escalation, security restriction bypass, spoofing or tampering on an affected device.
Recommendation:
Apple has released new version of iOS and iPadOS to address the issue.
The updates can be obtained through the auto-update mechanism. Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
More Information:
- https://support.apple.com/en-us/HT213673
- https://support.apple.com/en-us/HT213676
- https://www.hkcert.org/security-bulletin/apple-products-multiple-vulnerabilities_20230328
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23494
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23523
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23525 (to CVE-2023-23529)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23532
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23535
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23537
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23540 (to CVE-2023-23541)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23543
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27928 (to CVE-2023-27929)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27931 (to CVE-2023-27933)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27936 (to CVE-2023-27937)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27941 (to CVE-2023-27943)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27946
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27949
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954 (to CVE-2023-27956)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27959
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27961
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27963
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27969 (to CVE-2023-27970)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28178
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28181 (to CVE-2023-28182)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28194