Amid the pomp and show surrounding the launch of Apple’s next 16 series of smartphones and other devices, the cybersecurity watchdog, Computer Emergency Response Team (CERT-In), under the Ministry of Electronics and Information Technology (MeitY), has flagged privacy vulnerabilities, issuing a high severity alert concerning the Apple products like the iOS, iPadOS and macOS. The alert suggests that Apple products are prone to vulnerabilities, allowing attackers can access sensitive information. 

COMMERCIAL BREAK
SCROLL TO CONTINUE READING

According to the warning issued by CERT-In, “Multiple vulnerabilities have been reported in Apple products which could allow an attacker to access sensitive information, execute arbitrary code, bypass security restrictions, cause denial of service (DoS) conditions, bypass authentication, gain elevated privileges and perform spoofing attacks on the targeted system.” 

The following iOS, iPadOS, macOS, watchOS, tvOS, Safari, Xcode, and visionOS versions are likely to be vulnerable: 

- Apple iOS versions prior to 18 and iPadOS versions prior to 18

- Apple iOS versions prior to 17.7 and iPadOS versions prior to 17.7

- Apple macoS Sonoma versions prior to 14.7

- Apple macOS Ventura versions prior to 13.7

- Apple macoS Sequoia versions prior to 15

- Apple tvOS versions prior to 18

- Apple watchOS versions prior to 11

- Apple Safari versions prior to 18

- Apple Xcode versions prior to 16

- Apple visionOS versions prior to 2 

CERT-In noted that the Cupertino-based tech giant has fixed the issues with the latest software updates. To mitigate the vulnerabilities, users should update their devices with the latest software versions.  

Earlier this year, CERT-In had also warned users of vulnerabilities in Apple iTunes and Google Chrome for desktop, which could allow an attacker to execute arbitrary code on the targeted system.

In an advisory, the watchdog stated that ‘The 'Remote Code Execution' vulnerability exists in the Apple Product due to improper checks in the CoreMedia component. A remote attacker could exploit this vulnerability by sending a specially crafted request.