Multiple vulnerabilities affecting Apple devices have prompted a high-severity alert from the Indian Computer Emergency Response Team (CERT-In). The alert, identified by the code CIAD-2024-0027, identifies a number of vulnerabilities that seriously jeopardise the security of iPads, Macs, iPhones, and related software ecosystems.
According to Cert-In, recent vulnerabilities reside in various Apple operating systems, including iOS, iPadOS, macOS, Safari, and tvOS. Cyber attackers could exploit these weaknesses to:
Elevate Privileges: Gain higher-level access within the system, allowing them to perform actions typically restricted to administrators.
Disclose Sensitive Information: Steal personal data like passwords, contacts, browsing history, or even financial information.
Bypass Security Restrictions: Circumvent security measures put in place to protect your device.
Execute Remote Code: Take complete control of your device and potentially install malware or perform other malicious activities.
Here is the list of Apple software versions currently at the high risk:
- iOS and iPadOS: Versions before 16.7.8 and 17.5
- macOS: Monterey versions before 12.7.5, Ventura versions before 13.5.7, and Sonoma versions before 14.5
- Safari: Versions before 17.5
- Apple TV: Versions before 17.5
In order to protect the devices, CERT-In has urged all Apple users to update their devices to the latest available versions immediately. These updates contain critical security patches that address the identified vulnerabilities.
Here's how to update your device:
iPhone and iPad:
· Go to Settings > General > Software Update.
· Download and install the latest update available.
Mac:
· Click on the Apple menu and select System Preferences.
· Go to Software Update and click "Update Now" to download and install the latest update.
Apple TV:
· Navigate to Settings > General > Software Updates.
· Select "Download and Install" for the latest update.
Additionally, here are some important tips to keep your devices safe from any such future vulnerabilities:
Regularly monitor official communications from Apple and relevant security authorities for updates and advisories regarding cybersecurity threats and vulnerabilities.
Exercise caution when accessing and interacting with potentially malicious websites, links, or files. Avoid clicking on suspicious links, downloading unauthorised software, or providing sensitive information to unknown sources. Implement security best practices, such as enabling two-factor authentication, using strong and unique passwords, and regularly backing up data to secure locations. These measures will help you enhance the overall security resilience of your Apple devices and mitigate the impact of potential security incidents.
See What’s Next in Tech With the Fast Forward Newsletter
Tweets From @varindiamag
Nothing to see here - yet
When they Tweet, their Tweets will show up here.