overview
Two zero-day vulnerabilities were recently discovered in certain iPhones, Macs, and iPads. CVE-2023-28206 is an IOSurfaceAccelerator out-of-bounds write flaw that can cause a crash, data corruption, or code execution. If successful, a maliciously crafted app could be used to gain kernel privileges on targeted devices, allowing an attacker to execute arbitrary code.
The second vulnerability, CVE-2023-28205, is a WebKit use after free flaw that leads to data corruption or arbitrary code execution when reusing freed memory. If successful, an attacker could trick victims into visiting malicious web pages that attackers’ control. This could lead to code execution on compromised systems. Apple has fixed both zero-day vulnerabilities in iOS 16.4.1, iPadOS 16.4.1, macOS Ventura 13.3.1, and Safari 16.4.1. The list of impacted devices is extensive and includes:
While Apple is aware of exploitation reports, they have not released details regarding attacks. Avertium recommends that users update their Apple devices as soon as possible.
At this time, there are no known IoCs associated with CVE-2023-28205 and CVE-2023-28206. Avertium's threat hunters remain vigilant in locating IoCs for our customers. If any are located, Avertium will disclose them as soon as possible. For more information on how Avertium can help protect your organization, please reach out to your Avertium Service Delivery Manager or Account Executive
SUPPORTING DOCUMENTATION