Context over chaos. Disconnected technologies, siloed data, and reactive processes can only get you so far. Protecting businesses in today’s threat landscape demands more than a set of security tools – it requires context.
That's where Avertium comes in
Security. It’s in our DNA. It’s elemental, foundational. Something that an always-on, everything’s-IoT-connected world depends on.
Helping mid-to-enterprise organizations protect assets and manage risk is our only business. Our mission is to make our customers’ world a safer place so that they may thrive in an always-on, connected world.
Best-in-class technology from our partners... backed by service excellence from Avertium.
Interested in becoming a partner?
With Avertium's deal registration, partners can efficiently and confidently connect with Avertium on opportunities to protect your deals.
Microsoft Copilot for Security analyzes and synthesizes high volumes of security data which can help healthcare cybersecurity teams do more with less.
Dive into our resource hub and explore top
cybersecurity topics along with what we do
and what we can do for you.
This week, Apple released more updates for the actively exploited zero-day CVE-2022-32893 – an out of bounds write issue that allows attackers to execute arbitrary code with kernel privileges, ultimately taking over an entire system.
The update, iOS 12.5.6, impacts the following:
The patches are for older devices running older versions of iOS, indicating that Apple may have come across some high-profile or high-risk users of older devices who were compromised. Earlier in August 2022, Apple patched a kernel vulnerability tracked as CVE-2022-32894. Apple stated in their advisory that iOS 12 is not impacted by CVE-2022-32894 but it is vulnerable to CVE-2022-32893.
All users impacted by CVE-2022-32893 and CVE-2022-32894 should implement the security updates as soon as possible. For guidance on how to update your device, please visit Apple’s Support page.
Apple released security updates for vulnerabilities found in iOS, iPadOS, MacOS Big Sur, and macOS Monterey. CVE-2022-32894 and CVE-2022-32893 are zero-day flaws that contain code execution vulnerabilities being exploited by attackers in the wild. There are few details surrounding the vulnerabilities or how they were leveraged, but the flaws are believed to be exploited for targeted attacks.
CVE-2022-32894 is an out-of-bounds write issue that allows attackers to execute arbitrary code with kernel privileges, ultimately taking over an entire system. CVE-2022-32893 is a WebKit flaw that allows attackers to execute arbitrary code through maliciously crafted web content. WebKit is a browser engine that powers Safari and other iOS web browsers. The bug can be triggered by processing maliciously crafted web content, which can then lead to arbitrary code execution.
Apple released updates to patch both vulnerabilities:
All users impacted by CVE-2022-32983 and CVE-2022-32984 should implement the security updates as soon as possible.
Please patch your device as soon as possible. You can find guidance on security updates at the links below:
INDICATOR'S OF COMPROMISE (IOCS):
About the security content of Safari 15.6.1 - Apple Support
Apple patches double zero-day in browser and kernel – update now! – Naked Security (sophos.com)
Apple Quietly Releases Another Patch for Zero-Day RCE Bug (darkreading.com)
About the security content of iOS 12.5.6 - Apple Support
Related Reading: Zeppelin Ransomware Targets Healthcare
Contact us for more information about Avertium’s managed security service capabilities.