CERT-In, the government body that keeps track of issues and bugs in operating systems and services, has issued a new warning for almost all Apple products, operating systems and services. This includes iPhone, iPad, Mac, Apple TV, iOS, iPadOS, macOS and more.
What’s the warning
The warning has been rated as “High” severity and the government body has mentioned that several new vulnerabilities have been found in the Apple products which could allow an attacker to access sensitive information, execute arbitrary code, bypass security restrictions and gain elevated privileges on the targeted system.
Affected Apple products
- Apple tvOS versions prior to 17.3
- Apple TV HD and Apple TV 4K (all models)
- Apple watchOS versions prior to 10.3
- Apple Watch Series 4 and later
- Apple macOS Monterey versions prior to 12.7.3
- Apple macOS Ventura versions prior to 13.6.4
- Apple macOS Sonoma versions prior to 14.3
- Apple iOS and iPadOS versions prior to 15.8.1
- iPhone 6s (all models), iPhone 7 (all models), iPhone SE (1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch (7th generation)
- Apple iOS and iPadOS versions prior to 16.7.5
- iPhone 8, iPhone 8 Plus, iPhone X, iPad 5th generation, iPad Pro 9.7-inch, and iPad Pro 12.9-inch 1st generation.
- Apple iOS and iPadOS versions prior to 17.3
- iPhone XS and later, iPad Pro 12.9-inch 2nd generation and later, iPad Pro 10.5-inch, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 6th generation and later, and iPad mini 5th generation and later
- Apple Safari versions prior to 17.3
- macOS Monterey and macOS Ventura
What users need to do about it
Users of older Apple operating systems and Safari have been urged by the government body to promptly download and install the latest versions. Fortunately, Apple has already released updated versions of iOS, iPadOS, macOS, and Safari, addressing the vulnerability and providing a fix. So, it is advisable to download and install the latest versions of operating system that’s available right now.
Affected Products | Severity | Impact | CVE |
Apple tvOS versions prior to 17.3 | HIGH | Arbitrary Code Execution | CVE-2024-23212 |
Information Disclosure | CVE-2024-23218 | ||
Security Restriction Bypass | CVE-2024-23208 | ||
Elevation of Privileges | CVE-2024-23223 | ||
CVE-2024-23215 | |||
CVE-2024-23210 | |||
CVE-2024-23206 | |||
CVE-2024-23213 | |||
CVE-2024-23222 | |||
Apple watchOS versions prior to 10.3 | HIGH | Arbitrary Code Execution | CVE-2024-23212 |
Information Disclosure | CVE-2024-23218 | ||
Security Restriction Bypass | CVE-2024-23208 | ||
Elevation of Privileges | CVE-2024-23207 | ||
CVE-2024-23223 | |||
CVE-2024-23211 | |||
CVE-2024-23204 | |||
CVE-2024-23217 | |||
CVE-2024-23215 | |||
CVE-2024-23210 | |||
CVE-2024-23206 | |||
CVE-2024-23213 | |||
Apple macOS Monterey versions prior to 12.7.3 | HIGH | Information Disclosure | CVE-2023-42937 |
Arbitrary Code Execution | CVE-2024-23212 | ||
CVE-2023-38545 | |||
CVE-2023-38039 | |||
CVE-2023-38546 | |||
CVE-2023-42915 | |||
CVE-2023-42888 | |||
CVE-2024-23207 | |||
CVE-2024-23222 | |||
Apple macOS Ventura versions prior to 136.4 | HIGH | Arbitrary Code Execution | CVE-2024-23212 |
Information Disclosure | CVE-2023-42937 | ||
Security Restriction Bypass | CVE-2023-40528 | ||
CVE-2023-38545 | |||
CVE-2023-38039 | |||
CVE-2023-38546 | |||
CVE-2023-42915 | |||
CVE-2024-23224 | |||
CVE-2023-42888 | |||
CVE-2023-42935 | |||
CVE-2024-23207 | |||
Apple macOS Sonoma versions prior to 14.3 | HIGH | Arbitrary Code Execution | CVE-2024-23212 |
Information Disclosure | CVE-2024-23218 | ||
Security Restriction Bypass | CVE-2024-23224 | ||
Elevation of Privileges | CVE-2024-23208 | ||
CVE-2024-23209 | |||
CVE-2024-23207 | |||
CVE-2024-23223 | |||
CVE-2024-23211 | |||
CVE-2024-23203 | |||
CVE-2024-23204 | |||
CVE-2024-23217 | |||
CVE-2024-23215 | |||
CVE-2024-23210 | |||
CVE-2024-23206 | |||
CVE-2024-23213 | |||
CVE-2024-23214 | |||
CVE-2024-23222 | |||
Apple iOS and iPadOS versions prior to 15.8,1 | HIGH | Arbitrary Code Execution | CVE-2023-42916 |
Information Disclosure | CVE-2023-42917 | ||
Apple iOS and iPadOS versions prior to 16.7.5 | HIGH | Arbitrary Code Execution | CVE-2023-42937 |
Information Disclosure | CVE-2024-23212 | ||
CVE-2023-42888 | |||
CVE-2024-23211 | |||
CVE-2024-23213 | |||
CVE-2024-23214 | |||
CVE-2024-23206 | |||
CVE-2024-23222 | |||
Apple iOS and iPadOS versions prior to 17.3 | HIGH | Arbitrary Code Execution | CVE-2024-23212 |
Information Disclosure | CVE-2024-23218 | ||
Security Restriction Bypass | CVE-2024-23208 | ||
Elevation of Privileges | CVE-2024-23207 | ||
CVE-2024-23223 | |||
CVE-2024-23219 | |||
CVE-2024-23211 | |||
CVE-2024-23203 | |||
CVE-2024-23204 | |||
CVE-2024-23217 | |||
CVE-2024-23215 | |||
CVE-2024-23210 | |||
CVE-2024-23206 | |||
CVE-2024-23213 | |||
CVE-2024-23214 | |||
Apple Safari versions prior to 17.3 | HIGH | Security Restriction Bypass | CVE-2024-23211 |
Arbitrary Code Execution | CVE-2024-23206 | ||
CVE-2024-23213 | |||
CVE-2024-23222 |