c1soc-cyber-threat-i-2
Insight Type: Blog
Maidar Secure Advisory: 0‑days exploit Vulnerability CVE‑2023‑41991, CVE‑2023‑41992, CVE-2023‑41993 for iPhones

Google’s Threat Analysis Group (TAG), in partnership with The Citizen Lab, discovered an in-the-wild 0‑day exploit chain for iPhones. Developed by the commercial surveillance vendor, Intellexa, this exploit chain is used to install its Predator spyware secretively onto a device.

Vulnerabilities Discussed

CVE-2023-41991
CVE-2023-41992
CVE-2023-41993

Table of Contents

  • Details of the Vulnerabilities
  • Countermeasures
  • Conclusion
  • References

Details of the Vulnerabilities

The vulnerabilities known as CVE-2023-41991, CVE-2023-41992, CVE-2023-41993 have been assigned CVSS base scores of 5.5 (Medium), 7.8 (High) and 9.8 (Critical), respectively. It presents substantial risks of Initial remote code execution (RCE) in Safari, PAC bypass and Local privilege escalation (LPE) in the XNU Kernel.

The Intellexa exploit chain was delivered via a “man-in-the-middle” (MITM) attack, where an attacker is in between the target and the website they’re trying to reach. If the target is going to a website using ‘http’, then the attacker can intercept the traffic and send fake data back to the target to force them to a different website.

Countermeasures

Apple patched the bugs in iOS 16.7 and iOS 17.0.

Conclusion

By updating iOS to the latest version, users can minimize exposure to this threat, we encourage all iOS users to install them as soon as possible.

References

Contact Us

If you have any questions or require further information on any other cybersecurity matters, please don’t hesitate to contact our dedicated team at [email protected].

If you want to see more about the SOC service we offer, please follow this link https://maidar.io.

To ask a question, go to our support portal, Maidar Secure SOC Customer Support.

Or Opt-In to our Threat Advisory Services here.

Share Articles

Insights

News Centre

Media Type
Maidar Secure Advisory:Black Basta Ransomware Operators Exploit M...
Overview The notorious ransomware group, Black Basta, has intensified its use of social engineering techniques to infiltrate organizations, leveraging Microsoft Teams and malicious...
Maidar Secure Achieves Prestigious ISO 27001:2022 Certification
Maidar Secure Achieves Prestigious ISO 27001:2022 Certification Maidar Secure is proud to announce its achievement of the internationally recognized ISO 27001:2022 certification, u...
Basic SOC-as-a-Service: Simplified Security for Growing Businesse...
As businesses grow, so do their cybersecurity challenges. From increased exposure to evolving threats, navigating today’s digital landscape requires robust protection. Yet, for man...
Why a Security Operations Center (SOC) is Essential for Businesse...
Organizations face constant threats to their digital assets, from malware and phishing to unauthorized access and advanced cyberattacks. Protecting sensitive data, ensuring operati...
Security Automation, Orchestration & Response
As a leading provider of SOC-as-a-Service (SOCaaS), Maidar Secure helps customers automate their repetitive security operations tasks through various means. Here are some examples:...
Standard SOC‑as‑a‑Service (SOCaaS)
Standard SOC-as-a-Service (SOCaaS) with SIEM Platform: A Proven Solution for Enhanced Security As a leading provider of SOC-as-a-Service (SOCaaS), Maidar Secure SOC offers a standa...
Hope is not a security strategy. Get proactive about your defence today with Maidar Secure.