Apple disclosed serious security vulnerabilities for iPhones, iPads and Macs that could potentially allow attackers to take complete control of these devices. The Cupertino tech giant has released software fixes for these vulnerabilities.
Apple released two security reports about the issue on Wednesday, although they didn’t receive wide attention outside of tech publications.
Also Read: Adobe CEO explains opportunities in the metaverse
Apple’s explanation of the vulnerability means a hacker could get “full admin access” to the device. That would allow intruders to impersonate the device’s owner and subsequently run any software in their name, said Rachel Tobac, CEO of SocialProof Security.
Security experts have advised users to update affected devices — iPhone 6s and later; several models of the iPad from the fifth generation, all iPads Pro, and the iPad Air 2; and Mac computers running macOS Monterey. The flaw also affects some iPod models.
Apple did not say in the reports how, where or by whom the vulnerabilities were discovered. In all cases, it cited an anonymous researcher.
Also Read: Indian semiconductor consumption to grow 19% per annum to $300 billion by 2026: Study
Commercial spyware companies such as Israel’s NSO Group are known for identifying and taking advantage of such flaws, exploiting them in malware that surreptitiously infects targets’ smartphones, siphons their contents and surveils the targets in real-time.
NSO Group has been blacklisted by the US Commerce Department. Its spyware is known to have been used in Europe, the Middle East, Africa and Latin America against journalists, dissidents and human rights activists.
Also Read: Elon Musk targets ad tech firms in Twitter suit over takeover deal
Security researcher Will Strafach said he had seen no technical analysis of the vulnerabilities that Apple has just patched. The company has previously acknowledged similarly serious flaws and, on what Strafach estimated to be perhaps a dozen occasions, has noted that it was aware of reports that such security holes had been exploited.