iPhone, MacBook, Apple iPad users in big DANGER; do this now
If you are using an iPhone, iPad, or MacBook, then know you are in danger! The Indian Computer Emergency Response Team (CERT-In), which is part of the Indian government's IT Ministry has warned that several security vulnerabilities have been detected in the operating systems of Apple, including iOS, iPadOS, and macOS. An online attacker can exploit these vulnerabilities while executing arbitrary code. The attacker can bypass security checks, and even cause denial of service on targeted systems. Further, these vulnerabilities can bring maliciously crafted web content to these hacked systems.
If you are owning an iPhone that is running on an older version than iOS 15. 6, then there are chances that multiple vulnerabilities may hit you. Similar is the case with the iPad users who are using their device in an older version than 15.6. In iPhones and iPads, these high-risk vulnerabilities have been found to exist due to out-of-bounds written in Audio, GPU Drivers, ICU, and WebKit, and buffer overflow in AppleAVD.
MacBook users are also affected!
CERT-In also issued high-risk warnings due to vulnerabilities found in Apple macOS Catalina prior to 20022-005, macOS Big Sur versions prior to 11.6.8, and macOS Monterey versions prior to 12.5. According to CERT-In, “these vulnerabilities exist due to out-of-bounds read in AppleScript, SMB and Kernel, out-of-bounds write in Audio, ICU, PS Normalizer, GU Drivers, SMB and WebKit.”
In addition to these, vulnerabilities are also found in AppleMobileFileIntegrity; information disclosure in the Calendar and iCloud Photo Library. Other reported vulnerabilities include logic issues in the File System Events, PluginKit, Windows Server, and Automation and memory corruption in Intel Graphics Driver, GPU Drivers, and SMB.
What should iPhone, iPad, and MacBook users do
The report says these high risk vulnerabilities in iPhone, iPad, and MacBook can be fixed by simply applying available security patches for Apple software available on your device. Keep an eye for all the latest updates, so that you can avoid getting affected by these vulnerabilities.