Google’s Threat Analysis Group (TAG), in partnership with The Citizen Lab, discovered an in-the-wild 0‑day exploit chain for iPhones. Developed by the commercial surveillance vendor, Intellexa, this exploit chain is used to install its Predator spyware secretively onto a device.
CVE-2023-41991
CVE-2023-41992
CVE-2023-41993
The vulnerabilities known as CVE-2023-41991, CVE-2023-41992, CVE-2023-41993 have been assigned CVSS base scores of 5.5 (Medium), 7.8 (High) and 9.8 (Critical), respectively. It presents substantial risks of Initial remote code execution (RCE) in Safari, PAC bypass and Local privilege escalation (LPE) in the XNU Kernel.
The Intellexa exploit chain was delivered via a “man-in-the-middle” (MITM) attack, where an attacker is in between the target and the website they’re trying to reach. If the target is going to a website using ‘http’, then the attacker can intercept the traffic and send fake data back to the target to force them to a different website.
Apple patched the bugs in iOS 16.7 and iOS 17.0.
By updating iOS to the latest version, users can minimize exposure to this threat, we encourage all iOS users to install them as soon as possible.
If you have any questions or require further information on any other cybersecurity matters, please don’t hesitate to contact our dedicated team at socsupport@maidar.io.
If you want to see more about the SOC service we offer, please follow this link https://maidar.io.
To ask a question, go to our support portal, Maidar Secure SOC Customer Support.
Or Opt-In to our Threat Advisory Services here.
We use cookies to improve your experience, personalise content and ads, to provide social media features and to analyse our traffic.By accepting this notice, you agree to our use of cookies.
These cookies are essential for the website to function properly. They help make a website usable by enabling basic functions like page navigation and access to secure areas of the website. The website cannot function properly without these cookies. They usually set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, or filling in forms.
Preference cookies enable a website to remember information that changes the way the website behaves or looks, like your preferred language or the region that you are in. They may be set through our site by our advertising partners. They do not store directly personal information, but are based on uniquely identifying your browser and internet device.
Helps analyze site usage to improve user experience. Assists us to understand how visitors interact with the website by collecting and reporting information anonymously. These may be set by us or by third party providers whose services we have added to our pages.
Used to track visitors across websites. The intention is to display ads that are relevant and engaging for the individual user and thereby more valuable for publishers and third party advertisers.