Home

Some companies that have chosen us

Privacy Officer and Privacy Consultant
CDP Scheme according to ISO/IEC 17024:2012
European Privacy Auditor
ISDP©10003 Certification Scheme according to ISO/IEC 17065:2012
Auditor
According to standard UNI 11697:2017
Lead Auditor ISO/IEC 27001:2022
According to standard ISO/IEC 17024:2012
Data Protection Officer
According to standard ISO/IEC 17024:2012
Anti-Bribery Lead Auditor Expert
According to standard ISO/IEC 17024:2012
ICT Security Manager
According to standard UNI 11506:2017
IT Service Management (ITSM)
According to the ITIL Foundation
Ethical Hacker (CEH)
According to the EC-Council
Network Defender (CND)
According to the EC-Council
Computer Hacking Forensics Investigator (CHFI)
According to the EC-Council
Penetration Testing Professional (CPENT)
According to the EC-Council

Professional qualifications

Stay up-to-date with world news!

Select your topics of interest:
CYBER ALERT
Home / CYBER ALERT
/
Apple Security Updates (AL01/240123/CSIRT-ITA)

Apple Security Updates (AL01/240123/CSIRT-ITA)

Summary

Apple has released security updates to fix 29 vulnerabilities in its products, including one 0-day vulnerability.

Note: The vendor states that CVE-2024-23222 is being actively exploited online.

Risk

Vulnerability impact rating on the community: SERIOUS/RED (77.94/100)1.

Type

  • Remote Code Execution
  • Security Restriction Bypass
  • Information Disclosure
  • Elevation of Privilege

Affected Products and Versions

Apple

  • Safari 17.x, versions prior to 17.3
  • iOS 17.0.x, versions prior to 17.3
  • iPadOS 17.0.x, versions prior to 17.3
  • iOS 16.7.x, versions prior to 16.7.5
  • iPadOS 16.7.x, versions prior to 16.7.5
  • iOS 15.8.x, versions prior to 15.8.1
  • iPadOS 15.8.x, versions prior to 15.8.1
  • macOS Sonoma, versions prior to 14.3
  • macOS Ventura, versions prior to 13.6.4
  • macOS Monterey, versions prior to 12.7.3
  • tvOS 17.x, prior to 17.3
  • watchOS 10.x, prior to 10.3

Mitigation Actions

In line with vendor statements, it is recommended to apply patches according to the guidance in the security bulletins, available in the References section.

Unique Vulnerability Identifiers

CVE-IDs
CVE-2023-38039CVE-2023-38545CVE-2023-38546CVE-2023-40528
CVE-2023-42887CVE-2023-42888CVE-2023-42915CVE-2023-42916
CVE-2023-42917CVE-2023-42935CVE-2023-42937CVE-2024-23203
CVE-2024-23204CVE-2024-23206CVE-2024-23207CVE-2024-23208
CVE-2024-23209CVE-2024-23210CVE-2024-23211CVE-2024-23212
CVE-2024-23213CVE-2024-23214CVE-2024-23215CVE-2024-23217
CVE-2024-23218CVE-2024-23219CVE-2024-23222CVE-2024-23223
CVE-2024-23224

References

https://support.apple.com/en-sg/HT201222

https://support.apple.com/it-it/HT214056

https://support.apple.com/it-it/HT214059

https://support.apple.com/it-it/HT214063

https://support.apple.com/it-it/HT214062

https://support.apple.com/it-it/HT214061

https://support.apple.com/it-it/HT214058

https://support.apple.com/it-it/HT214057

https://support.apple.com/it-it/HT214060

1This estimate is made taking into account several parameters, including: CVSS, availability of patches/workarounds and PoC, diffusion of the affected software/devices in the reference community.

Recommended to you

Search in 365TRUST

Our services