Wednesday, May 20, 2026
HomeCyber SecurityCISA orders federal businesses to replace iPhones, Macs till Feb twenty fifth

CISA orders federal businesses to replace iPhones, Macs till Feb twenty fifth

[ad_1]

CISA orders federal businesses to replace iPhones, Macs till Feb twenty fifth

The US Cybersecurity and Infrastructure Safety Company (CISA) has added a brand new flaw to its catalog of vulnerabilities exploited within the wild, an Apple WebKit distant code execution bug used to focus on iPhones, iPads, and Macs.

In line with the binding operational directive (BOD 22-01) issued by CISA in November, federal businesses are actually required to patch their methods in opposition to this actively exploited vulnerability impacting iOS, iPadOS, and macOS units.

CISA mentioned that all Federal Civilian Government Department Companies (FCEB) businesses must patch the vulnerability tracked as CVE-2022-22620 [1, 2] till February twenty fifth, 2022.

“These kinds of vulnerabilities are a frequent assault vector for malicious cyber actors of all kinds and pose vital danger to the federal enterprise,” the cybersecurity company mentioned.

“Though BOD 22-01 solely applies to FCEB businesses, CISA strongly urges all organizations to scale back their publicity to cyberattacks by prioritizing well timed remediation of Catalog vulnerabilities as a part of their vulnerability administration follow.”

Yesterday, CISA additionally requested FCEB businesses to patch 15 different vulnerabilities tagged as being beneath lively exploitation, with CVE-2021-36934 — a Microsoft Home windows SAM (Safety Accounts Supervisor) bug permitting privilege escalation and credential theft — having a February twenty fourth patch deadline.

Third zero-day patched by Apple this 12 months

The CVE-2022-22620 is the third zero-day Apple has patched because the begin of 2022 and is a WebKit Use After Free problem exploitable for OS crashes and code execution on weak units.

Profitable exploitation permits attackers to execute arbitrary code on iPhones, iPads, and Macs after opening maliciously crafted internet pages utilizing Safari.

“Specifically, all browsers for iOS and iPadOS are based mostly on this open supply engine — that’s, not solely iPhone’s default Safari, but in addition Google Chrome, Mozilla Firefox and any others,” Kaspersky mentioned as we speak. “So even when you don’t use Safari, this vulnerability nonetheless impacts you straight.”

“Apple is conscious of a report that this problem could have been actively exploited,” the corporate added when describing the zero-day.

Apple has addressed the vulnerability with improved reminiscence administration in iOS 15.3.1, iPadOS 15.3.1, and macOS Monterey 12.2.1.

The whole checklist of impacted units is sort of in depth, and it contains iPhone 6s and later, a number of iPad fashions, and Macs working macOS Monterey.

Despite the fact that this flaw was seemingly solely utilized in a small variety of focused assaults, it is nonetheless extremely advisable to put in the updates as quickly as potential to dam potential assault makes an attempt, simply as CISA urged earlier as we speak.

In January, Apple additionally patched two different actively exploited zero-days that may let attackers observe shopping exercise and customers’ identities in real-time (CVE-2022-22594) and achieve arbitrary code execution with kernel privileges (CVE-2022-22587).

[ad_2]

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments