A new security update released by Apple yesterday patches 20 different vulnerabilities on iPhone and iPad OS. Users can now update to iOS 16.1 and iPadOS 16 to apply these security patches and protect their devices. 14 of the vulnerabilities addressed in this update allow the execution of arbitrary code, 9 of which can execute this code with kernel privileges. Apple have stated that they are aware one of these arbitrary code execution with kernel privileges vulnerabilities may have been actively exploited.
Tracked as CVE-2022-42827, this actively exploited kernel vulnerability is caused by an out-of-bounds write issue. This is also described as a memory corruption flaw, because the ability to execute code occurs within the buffer surrounding a segment of memory. Threat actors could take advantage of this vulnerability by causing an app to write data outside of the intended buffer. This can crash the software, cause data corruption, and allow for arbitrary code execution. This code execution occurs with kernel privileges, which is the core iOS code with access to all apps and hardware, so has unrestricted privileges. Apple have fixed this issue through improved bounds checking being included in this most recent update.
Other notable vulnerabilities patched in this update include a logic issue that could cause sensitive user information to be disclosed through malicious web content, user interface spoofing on malicious websites, a core Bluetooth flaw allowing connected AirPods to record audio, and an app being able to modify protected parts of the file system. Apple’s latest security updates can be found on their support website, including the 7 updates released yesterday for a variety of Apple products. Updating to the latest software version on all devices will provide the best security protection. Apple do not disclose security risks until patches are released, however now these patches are available it is important to apply them as soon as possible before information about the vulnerabilities included in this update becomes public.
“We were very impressed with the service, I will say, the vulnerability found was one our previous organisation had not picked up, which does make you wonder if anything else was missed.”
Aim Ltd Chief Technology Officer (CTO)