{"id":2281,"date":"2022-08-23T03:21:05","date_gmt":"2022-08-23T03:21:05","guid":{"rendered":"https:\/\/cleanerone.trendmicro.com\/blog\/?p=2281"},"modified":"2022-08-23T03:21:05","modified_gmt":"2022-08-23T03:21:05","slug":"critical-apple-security-flaw-billion-users-influenced","status":"publish","type":"post","link":"https:\/\/cleanerone.trendmicro.com\/blog\/critical-apple-security-flaw-billion-users-influenced\/","title":{"rendered":"Critical Apple Security Flaws Allow Hackers to Take Control of 1.5 Billion macOS and iOS Users"},"content":{"rendered":"<p>Apple has announced the discovery of a critical security flaw in iPhones, iPads, and Macs that may let attackers seize complete control of a victim&#8217;s device.<br \/>\n<picture><source srcset=\"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/webp-express\/webp-images\/doc-root\/blog\/wp-content\/uploads\/2022\/08\/security-flaw-1024x576.png.webp\" type=\"image\/webp\"><img decoding=\"async\" src=\"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2022\/08\/security-flaw-1024x576.png\" alt=\"security-flaw\" class=\"webpexpress-processed\"><\/picture><\/p>\n<h2>About the Security Flaw<\/h2>\n<h3>\u2022   Who found it?<\/h3>\n<p>Apple did not disclose who discovered the vulnerability or where it was found in its reports. Anonymous researchers were credited throughout.<\/p>\n<h3>\u2022   Did hackers know about it beforehand?<\/h3>\n<p>Apple has acknowledged that the flaw was possibly exploited. However, no further information was provided.<\/p>\n<h3>\u2022   How does it work?<\/h3>\n<p>Apple claims that the vulnerability can be taken advantage of by &#8220;processing web content,&#8221; which means going to a website containing malicious code. By luring an unsuspecting user to such a website, attackers who were aware of the flaw and how to exploit it may take full control of a victim&#8217;s device and run any arbitrary code they want.<\/p>\n<p>For security reasons, typically, devices will restrict which parts of the system they will allow code to access. However, this vulnerability permitted code to be executed with access to the kernel. With kernel access comes unlimited access to all components of the operating system, which means the attacker could take complete control of a victim\u2019s device.<\/p>\n<h3>Related CVE Number:<\/h3>\n<p>CVE-2022-32894<br \/>\nCVE-2022-32893<br \/>\nCVE-2022-32893<\/p>\n<h2>The Threat to the General Public<\/h2>\n<p>Ritesh Kotak, a cybersecurity analyst, said the recent security flaw discovered in Apple devices demonstrates how any kind of personal information placed on electronic devices is vulnerable and can be &#8216;weaponized.&#8217;<\/p>\n<p>It&#8217;s possible that cybercriminals can reverse-engineer the security update and launch attacks on members of the public who haven&#8217;t upgraded their devices now that the vulnerability is public knowledge.<\/p>\n<h2>Precautionary Measures<\/h2>\n<p>Experts in information security have advised users to upgrade affected devices, including the iPhone 6S and later versions, many iPad models, 5th generation iPads and later, all iPad Pro models, the iPad Air 2, and Mac computers running macOS Monterey. The problem affects some iPod models as well.  (The latest version of iOS and iPadOS is 15.6.1, while macOS is 12.5.1.)<br \/>\n<picture><source srcset=\"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/webp-express\/webp-images\/doc-root\/blog\/wp-content\/uploads\/2022\/08\/ios-1024x1024.png.webp\" type=\"image\/webp\"><img decoding=\"async\" src=\"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2022\/08\/ios-1024x1024.png\" alt=\"IOS\" class=\"webpexpress-processed\"><\/picture><br \/>\n<picture><source srcset=\"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/webp-express\/webp-images\/doc-root\/blog\/wp-content\/uploads\/2022\/08\/macos-1024x1024.png.webp\" type=\"image\/webp\"><img decoding=\"async\" src=\"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2022\/08\/macos-1024x1024.png\" alt=\"macOS\" class=\"webpexpress-processed\"><\/picture><\/p>\n<p>Since the flaw is potentially being actively exploited right now, owners of the aforementioned devices would be prudent to install the most recent software updates on their devices.<\/p>\n<p>If, after updating your devices, you are still worried about the risks, you can download <a class=\"wp-editor-md-post-content-link\" href=\"https:\/\/cleanerone.trendmicro.com\/cleaner-one-pro-for-mac\/\" title=\"**Cleaner One Pro**\"><strong>Cleaner One Pro<\/strong><\/a> on your Mac, and use <strong><em>Vulnerability Scan<\/em><\/strong> to scan the system for vulnerabilities.<br \/>\n<picture><source srcset=\"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/webp-express\/webp-images\/doc-root\/blog\/wp-content\/uploads\/2022\/08\/app-manager-1024x576.png.webp\" type=\"image\/webp\"><img decoding=\"async\" src=\"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2022\/08\/app-manager-1024x576.png\" alt=\"app-manager\" class=\"webpexpress-processed\"><\/picture><br \/>\n<picture><source srcset=\"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/webp-express\/webp-images\/doc-root\/blog\/wp-content\/uploads\/2022\/08\/vulnerability-scan-1024x576.png.webp\" type=\"image\/webp\"><img decoding=\"async\" src=\"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2022\/08\/vulnerability-scan-1024x576.png\" alt=\"vulnerability-scan\" class=\"webpexpress-processed\"><\/picture><\/p>\n<p><a class=\"wp-editor-md-post-content-link\" href=\"https:\/\/gr.trendmicro.com\/GREntry\/NonPayment?Target=TrendCleaner&amp;OS=Mac&amp;SP=&amp;PID=TCP60&amp;FunID=Download&amp;VID=COPG0002&amp;Locale=\" target=\"_blank\" rel=\"noopener\"><picture><source srcset=\"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/webp-express\/webp-images\/doc-root\/blog\/wp-content\/uploads\/2022\/08\/Cleaner-One-download-the-app-640x195-2-300x91.png.webp\" type=\"image\/webp\"><img decoding=\"async\" src=\"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2022\/08\/Cleaner-One-download-the-app-640x195-2-300x91.png\" alt=\"\" class=\"webpexpress-processed\"><\/picture><\/a><\/p>\n<p>Related Reading:<br \/>\n<a class=\"wp-editor-md-post-content-link\" href=\"https:\/\/support.apple.com\/en-us\/HT213412\" title=\"About the security content of iOS 15.6.1 and iPadOS 15.6.1\" target=\"_blank\" rel=\"noopener\">About the security content of iOS 15.6.1 and iPadOS 15.6.1<\/a><\/p>\n<p><a class=\"wp-editor-md-post-content-link\" href=\"https:\/\/support.apple.com\/en-us\/HT213414\" title=\"About the security content of Safari 15.6.1\" target=\"_blank\" rel=\"noopener\">About the security content of Safari 15.6.1<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple has announced the discovery of a critical security flaw in iPhones, iPads, and Macs that may let attackers seize complete control of a victim&#8217;s device. About the Security Flaw \u2022 Who found it? Apple did not disclose who discovered the vulnerability or where it was found in its reports. Anonymous researchers were credited throughout. \u2022 Did hackers know about it beforehand? Apple has acknowledged that the flaw was possibly exploited. However, no further information was provided. \u2022 How does it work? Apple claims that the vulnerability can be taken advantage of by &#8220;processing web content,&#8221; which means going to <\/p>\n","protected":false},"author":2,"featured_media":2284,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_locale":"","_original_post":"","footnotes":""},"categories":[1,85],"tags":[],"class_list":["post-2281","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-howto","category-mac","en-US","has_thumb"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Critical Apple Security Flaws Allow Hackers to Take Control of 1.5 Billion macOS and iOS Users<\/title>\n<meta name=\"description\" content=\"Apple has warned of serious vulnerabilities for iPhones, iPads and Macs that could allow hackers to take complete control of devices.How to deal with the security flaw.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cleanerone.trendmicro.com\/blog\/critical-apple-security-flaw-billion-users-influenced\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Critical Apple Security Flaws Allow Hackers to Take Control of 1.5 Billion macOS and iOS Users\" \/>\n<meta property=\"og:description\" content=\"Apple has warned of serious vulnerabilities for iPhones, iPads and Macs that could allow hackers to take complete control of devices.How to deal with the security flaw.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cleanerone.trendmicro.com\/blog\/critical-apple-security-flaw-billion-users-influenced\/\" \/>\n<meta property=\"og:site_name\" content=\"Apple &amp; Microsoft News,Tutorials,Security Tips|Cleaner One Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-23T03:21:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2022\/08\/apple-security-remote-control.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1434\" \/>\n\t<meta property=\"og:image:height\" content=\"553\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Louis.G\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Louis.G\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cleanerone.trendmicro.com\/blog\/critical-apple-security-flaw-billion-users-influenced\/\",\"url\":\"https:\/\/cleanerone.trendmicro.com\/blog\/critical-apple-security-flaw-billion-users-influenced\/\",\"name\":\"Critical Apple Security Flaws Allow Hackers to Take Control of 1.5 Billion macOS and iOS Users\",\"isPartOf\":{\"@id\":\"https:\/\/cleanerone.trendmicro.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cleanerone.trendmicro.com\/blog\/critical-apple-security-flaw-billion-users-influenced\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cleanerone.trendmicro.com\/blog\/critical-apple-security-flaw-billion-users-influenced\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2022\/08\/apple-security-remote-control.png\",\"datePublished\":\"2022-08-23T03:21:05+00:00\",\"dateModified\":\"2022-08-23T03:21:05+00:00\",\"author\":{\"@id\":\"https:\/\/cleanerone.trendmicro.com\/blog\/#\/schema\/person\/5ad5cb6695a57e01a5a55b3d5a2a4adb\"},\"description\":\"Apple has warned of serious vulnerabilities for iPhones, iPads and Macs that could allow hackers to take complete control of devices.How to deal with the security flaw.\",\"breadcrumb\":{\"@id\":\"https:\/\/cleanerone.trendmicro.com\/blog\/critical-apple-security-flaw-billion-users-influenced\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cleanerone.trendmicro.com\/blog\/critical-apple-security-flaw-billion-users-influenced\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cleanerone.trendmicro.com\/blog\/critical-apple-security-flaw-billion-users-influenced\/#primaryimage\",\"url\":\"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2022\/08\/apple-security-remote-control.png\",\"contentUrl\":\"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2022\/08\/apple-security-remote-control.png\",\"width\":1434,\"height\":553,\"caption\":\"apple security flaw\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cleanerone.trendmicro.com\/blog\/critical-apple-security-flaw-billion-users-influenced\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cleanerone.trendmicro.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Critical Apple Security Flaws Allow Hackers to Take Control of 1.5 Billion macOS and iOS Users\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cleanerone.trendmicro.com\/blog\/#website\",\"url\":\"https:\/\/cleanerone.trendmicro.com\/blog\/\",\"name\":\"Apple &amp; Microsoft News,Tutorials,Security Tips|Cleaner One Blog\",\"description\":\"Keep up with latest stories and product updates from Cleaner One. News about technology, software,cybersecurity, and more.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cleanerone.trendmicro.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/cleanerone.trendmicro.com\/blog\/#\/schema\/person\/5ad5cb6695a57e01a5a55b3d5a2a4adb\",\"name\":\"Louis.G\",\"url\":\"https:\/\/cleanerone.trendmicro.com\/blog\/author\/louis-g\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Critical Apple Security Flaws Allow Hackers to Take Control of 1.5 Billion macOS and iOS Users","description":"Apple has warned of serious vulnerabilities for iPhones, iPads and Macs that could allow hackers to take complete control of devices.How to deal with the security flaw.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cleanerone.trendmicro.com\/blog\/critical-apple-security-flaw-billion-users-influenced\/","og_locale":"en_US","og_type":"article","og_title":"Critical Apple Security Flaws Allow Hackers to Take Control of 1.5 Billion macOS and iOS Users","og_description":"Apple has warned of serious vulnerabilities for iPhones, iPads and Macs that could allow hackers to take complete control of devices.How to deal with the security flaw.","og_url":"https:\/\/cleanerone.trendmicro.com\/blog\/critical-apple-security-flaw-billion-users-influenced\/","og_site_name":"Apple &amp; Microsoft News,Tutorials,Security Tips|Cleaner One Blog","article_published_time":"2022-08-23T03:21:05+00:00","og_image":[{"width":1434,"height":553,"url":"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2022\/08\/apple-security-remote-control.png","type":"image\/png"}],"author":"Louis.G","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Louis.G","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cleanerone.trendmicro.com\/blog\/critical-apple-security-flaw-billion-users-influenced\/","url":"https:\/\/cleanerone.trendmicro.com\/blog\/critical-apple-security-flaw-billion-users-influenced\/","name":"Critical Apple Security Flaws Allow Hackers to Take Control of 1.5 Billion macOS and iOS Users","isPartOf":{"@id":"https:\/\/cleanerone.trendmicro.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cleanerone.trendmicro.com\/blog\/critical-apple-security-flaw-billion-users-influenced\/#primaryimage"},"image":{"@id":"https:\/\/cleanerone.trendmicro.com\/blog\/critical-apple-security-flaw-billion-users-influenced\/#primaryimage"},"thumbnailUrl":"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2022\/08\/apple-security-remote-control.png","datePublished":"2022-08-23T03:21:05+00:00","dateModified":"2022-08-23T03:21:05+00:00","author":{"@id":"https:\/\/cleanerone.trendmicro.com\/blog\/#\/schema\/person\/5ad5cb6695a57e01a5a55b3d5a2a4adb"},"description":"Apple has warned of serious vulnerabilities for iPhones, iPads and Macs that could allow hackers to take complete control of devices.How to deal with the security flaw.","breadcrumb":{"@id":"https:\/\/cleanerone.trendmicro.com\/blog\/critical-apple-security-flaw-billion-users-influenced\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cleanerone.trendmicro.com\/blog\/critical-apple-security-flaw-billion-users-influenced\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cleanerone.trendmicro.com\/blog\/critical-apple-security-flaw-billion-users-influenced\/#primaryimage","url":"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2022\/08\/apple-security-remote-control.png","contentUrl":"https:\/\/cleanerone.trendmicro.com\/blog\/wp-content\/uploads\/2022\/08\/apple-security-remote-control.png","width":1434,"height":553,"caption":"apple security flaw"},{"@type":"BreadcrumbList","@id":"https:\/\/cleanerone.trendmicro.com\/blog\/critical-apple-security-flaw-billion-users-influenced\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cleanerone.trendmicro.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Critical Apple Security Flaws Allow Hackers to Take Control of 1.5 Billion macOS and iOS Users"}]},{"@type":"WebSite","@id":"https:\/\/cleanerone.trendmicro.com\/blog\/#website","url":"https:\/\/cleanerone.trendmicro.com\/blog\/","name":"Apple &amp; Microsoft News,Tutorials,Security Tips|Cleaner One Blog","description":"Keep up with latest stories and product updates from Cleaner One. News about technology, software,cybersecurity, and more.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cleanerone.trendmicro.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/cleanerone.trendmicro.com\/blog\/#\/schema\/person\/5ad5cb6695a57e01a5a55b3d5a2a4adb","name":"Louis.G","url":"https:\/\/cleanerone.trendmicro.com\/blog\/author\/louis-g\/"}]}},"_links":{"self":[{"href":"https:\/\/cleanerone.trendmicro.com\/blog\/wp-json\/wp\/v2\/posts\/2281","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cleanerone.trendmicro.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cleanerone.trendmicro.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cleanerone.trendmicro.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cleanerone.trendmicro.com\/blog\/wp-json\/wp\/v2\/comments?post=2281"}],"version-history":[{"count":6,"href":"https:\/\/cleanerone.trendmicro.com\/blog\/wp-json\/wp\/v2\/posts\/2281\/revisions"}],"predecessor-version":[{"id":2297,"href":"https:\/\/cleanerone.trendmicro.com\/blog\/wp-json\/wp\/v2\/posts\/2281\/revisions\/2297"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cleanerone.trendmicro.com\/blog\/wp-json\/wp\/v2\/media\/2284"}],"wp:attachment":[{"href":"https:\/\/cleanerone.trendmicro.com\/blog\/wp-json\/wp\/v2\/media?parent=2281"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cleanerone.trendmicro.com\/blog\/wp-json\/wp\/v2\/categories?post=2281"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cleanerone.trendmicro.com\/blog\/wp-json\/wp\/v2\/tags?post=2281"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}