• Apple iPhone, iPad, and MacBook users may be at high risk: Centre issues warning

    Sci & Tech
    Apple iPhone, iPad, and MacBook users may be at high risk: Centre issues warning
    MacBook users are also urged to update their systems promptly to mitigate the risk posed by the vulnerability...

    Digital Desk: The Indian Computer Emergency Response Team (CERT-In) has raised a red flag for users of Apple's popular devices, including iPhones, MacBooks, iPads, and Vision Pro headsets. In a recent security advisory, CERT-In classified the threat as "high-risk," shedding light on a critical vulnerability lurking within various Apple products.

    The identified vulnerability, linked to "remote code execution," casts a wide net of concern over a spectrum of Apple software and hardware. The affected products include Apple Safari versions preceding 17.4.1, macOS Ventura versions before 13.6.6, macOS Sonoma versions before 14.4.1, visionOS versions preceding 1.1.1, as well as iOS and iPadOS versions earlier than 17.4.1 and 16.7.7, respectively.

    This vulnerability, with its potential for remote code execution, poses a significant threat. Exploiting an out-of-bounds write issue in WebRTC and CoreMedia, malicious actors can gain control over targeted systems remotely, allowing them to execute arbitrary code.

    Users of various iPhone and iPad models are particularly vulnerable if their devices are not running the latest iOS and iPadOS versions. MacBook users are also urged to update their systems promptly to mitigate the risk posed by the vulnerability.

    To safeguard against potential compromise, CERT-In recommends several precautionary measures:

    1. Keep Software Updated: Ensure that Apple iOS, iPadOS, macOS, and visionOS are updated to the latest versions containing security patches.

    2. Network Security Awareness: Minimize the risk of unauthorized access by avoiding connections to unsecured or public Wi-Fi networks.

    3. Implement Two-Factor Authentication (2FA): Add an extra layer of security against potential credential compromises by enabling 2FA.

    4. Download from Trusted Sources: Only download apps and software from reputable sources such as the Apple App Store to reduce the risk of malware.

    5. Regular Backups: Safeguard important data against security breaches or system failures by performing regular backups.

    By heeding these recommendations and staying vigilant, users can fortify their defenses against potential threats and enjoy a safer digital experience on their Apple devices.