

- #Apple ios macos catalina webkit full#
- #Apple ios macos catalina webkit software#
- #Apple ios macos catalina webkit code#
Researcher Denis Tokarev (aka illusionofchaos), who disclosed the latter three issues, said they were reported to Apple between March 10 and May 4, claiming what was "a frustrating experience participating in Apple Security Bounty program" for its failure to fix the issues despite having them responsibly disclosed "up to half a year" ago.
#Apple ios macos catalina webkit full#
The development also comes as security researchers have disclosed unpatched zero-day flaws in iOS, including a lock screen bypass bug and a clutch of vulnerabilities that could be abused by an app to gain access to users' Apple ID email addresses and full names, check if a specific app is installed on the device given its bundle ID, and even retrieve Wi-Fi information without proper authorization. The patches are available for devices running macOS Catalina and iPhone 5s, iPhone 6, iPhone 6 Plus, iPad Air, iPad mini 2, iPad mini 3, and iPod touch (6th generation) running iOS 12.5.4. The exploit is also significant for its ability to get around defenses built by Apple in iOS 14 - called BlastDoor - to prevent such intrusions by filtering untrusted data sent over the texting application.
#Apple ios macos catalina webkit code#
It relied on iMessage as an entry point to send malicious code that stealthily installed the Pegasus spyware on the devices and exfiltrate sensitive data without tipping the victims off. The updates should release publicly in the fall. STORY HIGHLIGHTS: iOS 15 and macOS 12 previews due this summer.
#Apple ios macos catalina webkit software#
The scale and scope of the operation remains unclear as yet. Christian Zibreg MaApple’s refreshed code for the WebKit layout engine used by Safari and other web browsers includes references to the major iOS 15 and macOS 12 software updates launching this fall. The zero-click remote attack weaponizing CVE-2021-30860 is said to have been carried out by a customer of the controversial Israeli company NSO Group since at least February 2021. Two other flaws include CVE-2021-30858 and CVE-2021-30860, both of which were resolved by the company earlier this month following disclosure from the University of Toronto's Citizen Lab about a previously unknown exploit called "FORCEDENTRY" (aka Megalodon) that could infect Apple devices without so much as a click. Google's Threat Analysis Group, which is credited with reporting the flaw, said it detected the vulnerability being "used in conjunction with a N-day remote code execution targeting WebKit." The Cupertino-based tech giant said it addressed the bug with improved state handling. Chief among them is CVE-2021-30869, a type confusion flaw that resides in the kernel component XNU developed by Apple that could cause a malicious application to execute arbitrary code with the highest privileges.
