• Tech News
  • Fintech
  • Startup
  • Games
  • Ar & Vr
  • Reviews
  • How To
  • More
    • Mobile Tech
    • Pc & Laptop
    • Security
What's Hot

Make iOS Easier to Use

April 15, 2026

How to Track Personal Hotspot Data Usage in iOS 26.4

April 14, 2026

9 Hidden iPhone Tips and Tricks You’ll Actually Use in 2026

April 13, 2026
Facebook Twitter Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook Twitter Instagram Pinterest VKontakte
Behind The ScreenBehind The Screen
  • Tech News
  • Fintech
  • Startup
  • Games
  • Ar & Vr
  • Reviews
  • How To
  • More
    • Mobile Tech
    • Pc & Laptop
    • Security
Behind The ScreenBehind The Screen
Home»Mobile Tech»iOS 17.0.1 re-patches 3 actively exploited security flaws
Mobile Tech

iOS 17.0.1 re-patches 3 actively exploited security flaws

September 21, 2023No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
iOS 17.0.1 re-patches 3 actively exploited security flaws
Share
Facebook Twitter LinkedIn Pinterest Email

Three days after launching iOS 17, Apple has issued iOS 17.0.1 with three essential safety patches. Notably, Apple says it’s conscious all the fastened vulnerabilities had been reported as being actively exploited.

Shortly after releasing iOS 17.0.1 together with iPadOS 17.0.1, watchOS 10.0.1, and extra with “essential bug fixes and safety updates,” Apple shared the vulnerability particulars on its safety web page.

3 actively exploited flaws fastened once more

Apple says that every of the three flaws had been first patched with iOS 16.7. Nevertheless, with two of them, iOS 17.0.1 brings “improved checks” whereas the third noticed “certificates validation situation” addressed to guard in opposition to the beforehand found bugs.

One was a kernal flaw, one other bypasses signature validation situation, and the final was a WebKit vulnerability that allowed arbitrary code execution.

Whereas it’s greatest to replace to the brand new launch to get the improved safety, consider you’ll want to put in iOS 17.0.1 in your iPhone 15/15 Professional earlier than restoring from a backup with this software program.

Listed below are the CVE’s for every fastened flaw:


Kernel

Obtainable for: iPhone XS and later, iPad Professional 12.9-inch 2nd technology and later, iPad Professional 10.5-inch, iPad Professional 11-inch 1st technology and later, iPad Air third technology and later, iPad sixth technology and later, iPad mini fifth technology and later

Affect: A neighborhood attacker might be able to elevate their privileges. Apple is conscious of a report that this situation might have been actively exploited in opposition to variations of iOS earlier than iOS 16.7.

See also  Apple Provides an Early Sneak Peek into Some Coming iOS 17 Enhancements

Description: The difficulty was addressed with improved checks.

CVE-2023-41992: Invoice Marczak of The Citizen Lab at The College of Toronto’s Munk Faculty and Maddie Stone of Google’s Risk Evaluation Group

Safety

Obtainable for: iPhone XS and later, iPad Professional 12.9-inch 2nd technology and later, iPad Professional 10.5-inch, iPad Professional 11-inch 1st technology and later, iPad Air third technology and later, iPad sixth technology and later, iPad mini fifth technology and later

Affect: A malicious app might be able to bypass signature validation. Apple is conscious of a report that this situation might have been actively exploited in opposition to variations of iOS earlier than iOS 16.7.

Description: A certificates validation situation was addressed.

CVE-2023-41991: Invoice Marczak of The Citizen Lab at The College of Toronto’s Munk Faculty and Maddie Stone of Google’s Risk Evaluation Group

WebKit

Obtainable for: iPhone XS and later, iPad Professional 12.9-inch 2nd technology and later, iPad Professional 10.5-inch, iPad Professional 11-inch 1st technology and later, iPad Air third technology and later, iPad sixth technology and later, iPad mini fifth technology and later

Affect: Processing internet content material might result in arbitrary code execution. Apple is conscious of a report that this situation might have been actively exploited in opposition to variations of iOS earlier than iOS 16.7.

Description: The difficulty was addressed with improved checks.

WebKit Bugzilla: 261544
CVE-2023-41993: Invoice Marczak of The Citizen Lab at The College of Toronto’s Munk Faculty and Maddie Stone of Google’s Risk Evaluation Group

FTC: We use earnings incomes auto affiliate hyperlinks. Extra.

Source link

17.0.1 actively exploited flaws iOS repatches security
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Make iOS Easier to Use

April 15, 2026

How to Track Personal Hotspot Data Usage in iOS 26.4

April 14, 2026

10 Essential iPhone Tips for New Users (iOS 26 Guide)

April 9, 2026

10 Hidden iPhone Features You’re Missing in iOS 26

February 4, 2026
Add A Comment

Comments are closed.

Editors Picks

What Female Business Women Need To Know About Prenups, According To BossBabe’s Danielle Canty

August 12, 2022

Transatlantic PET contest open for entries

July 20, 2022

How 4 Leaders Are Building Greater Transparency Into Their Businesses

November 20, 2022

The Pandemic Bike Boom Survives—in Cities That Stepped Up

November 14, 2022

Subscribe to Updates

Get the latest news and Updates from Behind The Scene about Tech, Startup and more.

Top Post

Make iOS Easier to Use

How to Track Personal Hotspot Data Usage in iOS 26.4

9 Hidden iPhone Tips and Tricks You’ll Actually Use in 2026

Behind The Screen
Facebook Twitter Instagram Pinterest Vimeo YouTube
  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2026 behindthescreen.fr - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.