Apple backports repair for RTKit iOS zero-day to older iPhones

Apple has backported safety patches launched in March to older iPhones and iPads, fixing an iOS Kernel zero-day tagged as exploited in assaults.

In safety advisories printed at present, Apple as soon as once more mentioned they’re conscious of stories that this vulnerability “may have been actively exploited.”

The flaw is a reminiscence corruption concern in Apple’s RTKit real-time working system that permits attackers with arbitrary kernel learn and write functionality to bypass kernel reminiscence protections. The corporate has not but attributed the invention of this safety vulnerability to a safety researcher.

On March fifth, the corporate addressed the zero-day vulnerability (tracked as CVE-2024-23296) for newer iPhone, iPad, and Mac fashions.

At the moment, Apple backported the March safety updates to handle this safety flaw on iOS 16.7.8, iPadOS 16.7.8, and macOS Ventura 13.6.7 with improved enter validation.

The listing of gadgets patched at present contains iPhone 8, iPhone 8 Plus, iPhone X, iPad fifth technology, iPad Professional 9.7-inch, and iPad Professional 12.9-inch 1st technology.

Three zero-days exploited in assaults patched in 2024

Apple has but to reveal who disclosed the zero-day or whether or not it was found internally, and it has offered no info on the character of the assaults exploiting it within the wild.

Though Apple has not launched particulars relating to CVE-2024-23296 exploitation, iOS zero-days are generally utilized in state-sponsored adware assaults concentrating on high-risk people, together with journalists, dissidents, and opposition politicians.

Whereas this zero-day was probably solely utilized in focused assaults, it’s extremely suggested to put in at present’s safety updates as quickly as doable to dam potential assault makes an attempt when you’re utilizing an older iPhone or iPad mannequin.

For the reason that begin of the yr, Apple has mounted three zero-days: two in March (CVE-2024-23225 and CVE-2024-23296) and one in January (CVE-2024-23222).

In January, Apple additionally backported patches for 2 WebKit zero-days (CVE-2023-42916 and CVE-2023-42917), which have been patched in November for newer gadgets.

With at present’s iOS 17.5 replace, Apple has additionally added assist for undesirable monitoring alerts (Google launched the identical functionality on Android 6.0+ gadgets).

These alerts will warn customers if Bluetooth monitoring gadgets (AirTag, Discover My accent, or different business specification-compatible Bluetooth tracker) are getting used to trace their location.

Recent articles