Tools

News

Notícias

Classificados

Cursos

Broker

IPv4:

IPv6:

 

UpOrDown
Ping
MTR
Smokeping
MTU Detect
Portscan
DNS
HTTP/SSL
My IP
IP Calc
IP Extractor
Uptime Monitor

Feds Patch 3 iOS Vulnerabilities

Image © Arstechnica
CISA has ordered federal agencies to patch three critical iOS vulnerabilities that were exploited in multiple campaigns over about 10 months, according to a Google report. The attacks used Coruna, a sophisticated exploit kit that chains 23 iOS flaws into five exploit sequences.

The Cybersecurity and Infrastructure Security Agency has ordered federal agencies to patch three critical iOS vulnerabilities that were exploited over a 10-month span in campaigns conducted by three distinct groups, according to a Google report.

All three operations relied on Coruna, an advanced exploit kit that aggregates 23 iOS exploits into five exploit chains. While some of the vulnerabilities had appeared as zero-days in earlier, unrelated campaigns, Google notes that all of them were patched by the time Coruna was observed exploiting them. When used against older iOS versions, Coruna’s codebase and capabilities still posed a serious threat.

Google researchers described Coruna as a “promiscuous” second-hand zero-day market, noting its extensive documentation, including English-language comments, and that the most advanced exploits employ non-public techniques and mitigation bypasses.

On Friday, CISA added three of the CVEs to its Known Exploited Vulnerabilities catalog, mandating patching for federal agencies under its authority and urging other organizations to do the same. The exploits affect iOS versions 13 through 17.2.1, with later versions not vulnerable; they do not trigger when Apple Lockdown is active or when private browsing is enabled.

Coruna features a never-before-seen JavaScript framework that obfuscates its operations to evade detection. When activated, the framework fingerprints the device and then loads suitable WebKit exploits, followed by a bypass of a defense known as pointer authentication code.

Google also cataloged the 23 exploits within Coruna, including codename lists, illustrating the scale of the operation and suggesting a market for “second-hand” zero-days as multiple actors acquire and reuse advanced exploitation techniques.

 

Arstechnica

Related News

Aspire Fiber Lands $50M Investment
Amazon Outage Impacts Checkout and Pages
NTIA BEAD Sessions Highlight EdTech Debates
AI Datacenters Pledge to Pay for Power
Spectrum expands CALNET services for California agencies
Surf Internet Closes $407M ABS

ISP.Tools survives thanks to ads.

Consider disabling your ad blocker.
We promise not to be intrusive.

Cookie Consent

We use cookies to improve your experience on our site.

By using our site you consent to cookies. Learn more