Tuesday, April 21, 2026
HomeCyber SecurityiOS customers: Patch now to keep away from falling prey to this...

iOS customers: Patch now to keep away from falling prey to this WebKit vulnerability

[ad_1]

iPhones, iPads and the iPod Contact are all in danger, and it doesn’t matter what internet browser you employ: All of them might let an attacker execute arbitrary code on an contaminated machine.

Picture: Adobe Inventory/ink drop

iOS customers could have seen an surprising software program replace on their units yesterday, and Apple is urging everybody to set up that replace instantly to keep away from falling prey to a use-after-free vulnerability that would enable an attacker to execute arbitrary code on a sufferer’s machine.

Use-after-free (UAF) assaults exploit an issue in how functions handle dynamic reminiscence allocation. Dynamic reminiscence is designed to retailer arbitrary-sized blocks, be used shortly after which freed and is managed by headers that assist apps perceive which blocks are occupied.

In some situations, reminiscence headers aren’t cleared correctly. When this occurs a program can allocate the identical chunk of knowledge to a different object with out clearing the heading. Right here’s the place an attacker can insert malicious code that will get picked up by one other app and executed on the unique buffer deal with.

SEE: Password breach: Why popular culture and passwords don’t combine (free PDF) (TechRepublic)

As Kaspersky identified in its announcement of the vulnerability, Apple doesn’t at all times clarify the particulars of vulnerabilities till it completes an investigation, so don’t anticipate loads of particulars past the truth that the bug exists in WebKit, and is of the UAF vulnerability class.

How this vulnerability impacts iOS customers

This explicit vulnerability, CVE-2022-22620, involves Apple from an nameless safety researcher, and Apple mentioned it “is conscious of a report that this problem could have been actively exploited.” Think about that your warning that it’s most likely already being exploited within the wild.

To be able to exploit this vulnerability, all that an attacker would wish was for his or her sufferer to go to a maliciously-crafted webpage, the very act of which might compromise the machine and permit for arbitrary code execution.

All the internet browsers accessible on iOS, from Safari to Chrome to Firefox and past, use WebKit. That signifies that every iOS machine is probably susceptible. It’s value noting that some macOS and Linux browsers use WebKit as effectively, so ensure that you replace any susceptible desktop browsers, too.

SEE: Google Chrome: Safety and UI ideas you must know (TechRepublic Premium)

Apple mentioned that the iPhone 6S and later, all iPad Professional fashions, iPad Air 2 and later, iPad fifth gen and later iPad Mini 4 and newer, and seventh era iPod Contact units would all have the ability to obtain the 15.3.1 replace for iOS and iPadOS.

iOS and iPadOS units ought to mechanically inform you of the necessity to replace, however in the event you’re but to see a notification, it’s a good suggestion to open the Settings app, navigate to Basic, after which to Software program Replace. Comply with the onscreen directions and nip this explicit bug within the bud.

[ad_2]

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments