Insight Type: Blog
Maidar Secure Advisory: 0‑days exploit Vulnerability CVE‑2023‑41991, CVE‑2023‑41992, CVE-2023‑41993 for iPhones

Google’s Threat Analysis Group (TAG), in partnership with The Citizen Lab, discovered an in-the-wild 0‑day exploit chain for iPhones. Developed by the commercial surveillance vendor, Intellexa, this exploit chain is used to install its Predator spyware secretively onto a device.

Vulnerabilities Discussed

CVE-2023-41991
CVE-2023-41992
CVE-2023-41993

Table of Contents

  • Details of the Vulnerabilities
  • Countermeasures
  • Conclusion
  • References

Details of the Vulnerabilities

The vulnerabilities known as CVE-2023-41991, CVE-2023-41992, CVE-2023-41993 have been assigned CVSS base scores of 5.5 (Medium), 7.8 (High) and 9.8 (Critical), respectively. It presents substantial risks of Initial remote code execution (RCE) in Safari, PAC bypass and Local privilege escalation (LPE) in the XNU Kernel.

The Intellexa exploit chain was delivered via a “man-in-the-middle” (MITM) attack, where an attacker is in between the target and the website they’re trying to reach. If the target is going to a website using ‘http’, then the attacker can intercept the traffic and send fake data back to the target to force them to a different website.

Countermeasures

Apple patched the bugs in iOS 16.7 and iOS 17.0.

Conclusion

By updating iOS to the latest version, users can minimize exposure to this threat, we encourage all iOS users to install them as soon as possible.

References

Contact Us

If you have any questions or require further information on any other cybersecurity matters, please don’t hesitate to contact our dedicated team at [email protected].

If you want to see more about the SOC service we offer, please follow this link https://maidar.io.

To ask a question, go to our support portal, Maidar Secure SOC Customer Support.

Or Opt-In to our Threat Advisory Services here.

Share Articles

Insights

News Centre

Media Type
Why SOAR is important… How is it different… How it helps your org...
Many organisations today want to harness the power of automation to rid themselves of redundant and tedious tasks. Triaging alerts into incidents or initiating the overly complex process of blocking a known threat acto...
How a Security Operations Centre Enhances Your Security Awareness...
In today’s digital landscape, organisations face a constant barrage of cyber threats that can disrupt operations, compromise sensitive data, and damage reputations. To safeguard against these risks, businesses em...
Artificial Intelligence in The Security Operations Center (SOC): ...
In today’s rapidly evolving digital landscape, businesses face constant threats from cybercriminals seeking to exploit vulnerabilities in their systems. As organisations strive to protect their sensitive data and...
Maidar Secure Advisory: SMM Driver Input Validation Vulnerability...
Lenovo released a security advisory (LEN-106014) for an SMM driver input validation vulnerability in the BIOS of some ThinkPad models. Identified as CVE-2022-48189, this vulnerability represents a substantial threat, a...
Maidar Secure Advisory: SMM Driver Input Validation Vulnerability...
Lenovo released a security advisory (LEN-106014) for an SMM driver input validation vulnerability in the BIOS of some ThinkPad models. Identified as CVE-2022-48189, this vulnerability represents a substantial threat, a...
Maidar Secure Advisory: 0‑days exploit Vulnerability CVE‑2023‑419...
Hope is not a security strategy. Get proactive about your defence today with Maidar Secure.