Home » Technology » a critical fix to be installed without delay…

a critical fix to be installed without delay…

Apple has rolled out security patches for iPhone, iPad and Mac to close critical flaws. Among them, two zero-day vulnerabilities could already be exploited to target Intel-based Macs. But these updates also concern devices running iOS and iPadOS.

Three technical documents detail these fixes: one for iOS 18.1.1 and iPadOS 18.1.1, another for macOS Sequoia 15.1.1, and a third for the Safari browser.

Which devices are affected?

Apple says the update for iOS and iPadOS is for iPhone XS and later, as well as various iPad models: 13-inch and 12.9-inch iPad Pro (3rd generation and later), iPad Pro 11-inch (1st generation and later), iPad Air (3rd generation and later), iPad (7th generation and later), and iPad mini (5th generation and later). The macOS update, on the other hand, is compatible with all computers that support macOS Sequoia.

Apple recommends that all affected users update their devices immediately.

Two critical flaws identified

  • CVE-2024-44308 (JavaScriptCore) : With this vulnerability, a malicious website designed to exploit the weakness could allow an attacker to take control of your device. Apple says it has corrected the problem with strengthened controls.
  • CVE-2024-44309 (WebKit) : This second flaw exposes users to cross-site scripting attacks, where an attacker could inject malicious scripts on a legitimate site to steal sensitive data or compromise the device. Apple has addressed this problem by improving cookie management.

Flaws already exploited by hackers?

Apple has acknowledged receiving reports that these flaws have been exploited on Macs equipped with Intel processors. However, vulnerabilities affecting a Mac can sometimes extend to an iPhone or iPad. By simultaneously releasing updates for these three categories of devices, Apple is undoubtedly hoping to block pirates.

Here are two ​PAA (People Also Ask) related questions for the provided text:

## World Today News Presents: Apple’s Emergency Security Patches: A Deep Dive

**Host:** Welcome, everyone, to World Today News. ‍Today’s topic is a⁤ critical one: Apple’s recent release of emergency security patches addressing two zero-day vulnerabilities affecting‍ iPhones, iPads, and Macs.

We are⁤ joined today by two experts to delve‌ deeper into this issue: **Dr. Emily Carter**,⁢ a cybersecurity researcher specializing in mobile device‌ security, and **Mr. David Lewis**, a long-standing tech journalist focusing on Apple products.

Welcome to the show!​

**Dr. Carter & Mr. Lewis:** Thank you for having‍ us.

**Host:** Let’s start with the basics. Dr. Carter, could you briefly explain what these vulnerabilities are and why they are considered so dangerous?

**Dr. Carter:** ⁣ Certainly. Essentially, these vulnerabilities, nicknamed CVE-2024-44308 and⁢ CVE-2024-44309, are weaknesses in Apple’s software that ⁤hackers can exploit​ to gain ‌unauthorized access to your device.

⁣ CVE-2024-44308 affects ⁤the JavaScriptCore engine, potentially allowing attackers⁢ to take complete control of a device through malicious websites.

CVE-2024-44309, focused on ‍the WebKit⁢ component, opens the door for cross-site scripting attacks. This means attackers could⁣ inject malicious code into legitimate websites​ to steal sensitive data or hijack your browsing​ session.

**Host:** Mr. Lewis, we’ve seen Apple⁣ address security⁣ vulnerabilities‍ before. What makes ‌this situation particularly urgent?

**Mr. Lewis:** The key here is the term “zero-day.” It means these⁤ vulnerabilities‍ were unknown to Apple until they were⁢ actively‌ being exploited⁣ by hackers in the wild. This is a serious red flag and⁤ underlines the potential for ‌widespread damage.

*Section 2: Affected Devices and‌ the Update Process*

**Host:** Dr. Carter, the ⁤article mentions specific models affected by these patches. Can you elaborate on which devices are at risk and how users can protect themselves?

**Dr. Carter:** The⁣ good news​ is that Apple has acted swiftly and released patches for all affected devices. This includes iPhones starting from the iPhone XS, various iPad⁣ models spanning several generations, and all Macs running ‌the macOS Sequoia operating system.

Apple strongly recommends immediate ‍updates for all users of these​ devices.

**Host:** Mr. Lewis, for our viewers who may not be tech-savvy,​ how straightforward is it to install these security updates?

**Mr. Lewis:** ⁣Generally, patching your Apple devices is quite user-friendly.‌ Most updates can be downloaded and ‍installed directly ‌through the device’s settings. Apple provides clear instructions, and the process is usually⁤ automated.

*Section 3: Implications and Best​ Practices*

**Host:** Dr. Carter, with the news of⁤ these vulnerabilities and ​their exploitation, what broader implications does this have⁣ for the ⁣tech industry and users in general?

**Dr. Carter:** This incident highlights the ever-present cat-and-mouse game between security researchers and cyber attackers. Zero-day vulnerabilities are a constant threat, and staying ahead of them requires⁣ continuous vigilance and rapid patching​ from software developers.

**Host:** Mr. Lewis, what advice would you give our audience to ⁤minimize their risk in light of these ongoing⁤ threats?

**Mr. Lewis:** The most ⁣crucial step is keeping your devices up to date. Enable automatic updates ⁤whenever possible. Beyond⁣ that, practice good online hygiene: be wary of suspicious links, avoid downloading apps from unknown sources, ⁣and be cautious about the information ⁤you‍ share online.

**Host:** Thank you both for your valuable insights. ⁤We ​hope ⁢this discussion ‍has shed light ⁤on‌ the ⁣importance⁢ of staying informed and taking proactive ‍steps to protect ourselves in our increasingly digital world.

**[End of Interview]**

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.