Apple backports fixes for CVE-2022-42827 zero-day to older iPhones, iPads

Pierluigi Paganini October 28, 2022

Apple released updates to backport the recently released security patches for CVE-2022-42827 zero-day to older iPhones and iPads.

Apple has released new security updates to backport security patches released this week to address actively exploited CVE-2022-42827 in older iPhones and iPads, addressing an actively exploited zero-day bug.

Early this week, Apple addressed the ninth zero-day vulnerability exploited in attacks in the wild since the start of the year. The CVE-2022-42827 vulnerability is an out-of-bounds write issue that can be exploited by an attacker to execute arbitrary code with kernel privileges.

The flaw was reported to Apple by an anonymous researcher, the company addressed it with improved bounds checking in iOS 16.1 and iPadOS 16.

“Apple is aware of a report that this issue may have been actively exploited.” reads the advisory published by Apple.

The vulnerability impacts iPhone 8 and later, iPad Pro (all models), iPad Air 3rd generation and later, iPad 5th generation and later, iPad mini 5th generation and later.

Apple released updates to address the zero-day issue in iOS 15.7.1 and iPadOS 15.7.1.

The flaw impacts iPhone 6s and later, iPad Pro (all models), iPad Air 2 and later, iPad 5th generation and later, iPad mini 4 and later, and iPod touch (7th generation).

Apple has addressed other eight zero-day vulnerabilities since January, below is the list of fixed issues:

Follow me on Twitter: @securityaffairs and Facebook

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, CVE-2022-42827)

[adrotate banner=”5″]

[adrotate banner=”13″]

you might also like

leave a comment