Apple patches 3 Zero-Day bugs in new iOS release


San Francisco, Nov 6 (IANS): Apple has patched three critical Zero-Day vulnerabilities first discovered by Google Threat Analysis Group (TAG).

The new iOS 14.2 update has fixed these vulnerabilities that may have allowed hackers to compromise iPhone devices remotely.

Shane Huntley, Director of Google's Threat Analysis Group, said the three iOS Zero-Days are related to the recent spat of three Chrome zero-days and a Windows zero-day that Google had previously disclosed over the past two weeks.

"While it's unknown if the zero-days have been used against selected targets or en-masse, iOS users are advised to update to iOS 14.2, just to be on the safe side," ZDNet reported on Friday.

The three iOS zero-days are a remote code execution issue, a privilege escalation vulnerability in the iOS kernel and a memory leak in the iOS kernel that allows attackers to retrieve content from an iOS device's kernel memory.

Google Project Zero team lead Ben Hawkes' team discovered and reported the attacks to Apple.

Apple officially released iOS 14.2 and iPadOS 14.2 on Thursday, bringing a variety of new features along with dozens of new emoji.

  

Top Stories


Leave a Comment

Title: Apple patches 3 Zero-Day bugs in new iOS release



You have 2000 characters left.

Disclaimer:

Please write your correct name and email address. Kindly do not post any personal, abusive, defamatory, infringing, obscene, indecent, discriminatory or unlawful or similar comments. Daijiworld.com will not be responsible for any defamatory message posted under this article.

Please note that sending false messages to insult, defame, intimidate, mislead or deceive people or to intentionally cause public disorder is punishable under law. It is obligatory on Daijiworld to provide the IP address and other details of senders of such comments, to the authority concerned upon request.

Hence, sending offensive comments using daijiworld will be purely at your own risk, and in no way will Daijiworld.com be held responsible.