Multiple vulnerabilities have recently been discovered in Apple Products, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

Apple is aware of reports that CVE-2023-32434CVE-2023-32435 and CVE-2023-32439 may have been actively exploited in the wild.

What You Should Do
Here is a listing of affected Apple Products:

  • iOS prior to 16.5.1
  • iPadOS prior to 16.5.1
  • macOS Ventura prior to 13.14.1
  • mac OS Monterey prior to 12.6.7
  • macOS Big Sur prior to 11.7.8
  • watchOS prior to 9.5.2

Information on how to update the affected products can be found on the Apple Security Page.

If you have questions or need assistance, contact a member of the Admiral team.

 

Used with permission from Article Aggregator