Apple Patches Multiple Vulnerabilities: Get Patching!

by

July 21, 2022

The Cupertino Fruit Company rolled out a bevy of software updates dedicated to fixing security flaws currently plaguing its software offerings.

The updates, released on Wednesday, July 20th, 2022, address 37 (at least) flaws currently impacting and everything in between. The updates addressed the following CVEs:

  • CVE-2002-2294 – Memory Corruption, WebRTC
  • CVE-2002-32810 – Apple Neural Engine
  • CVE-2002-32829 – Apple Neural Engine
  • CVE-2002-32840 – Apple Neural Engine
  • CVE-2002 – 32820 – Audio
  • CVE-2002-32821 – GPU Drivers
  • CVE-2002-32802 – ImageIO
  • CVE-2002-26768 – IOMobileFrameBuffer
  • CVE-2002-32813 – Kernel
  • CVE-2002-32815 – Kernel
  • CVE-2002-32792 – WebKit
  • CVE-2002-32844 – Kernel (Pointer Authentication)
  • CVE-2002-32785 – ImageIO (DoS)
  • CVE-2002-32819 – AppleMobileFileIntegrity & System Events (Privilege Escalation)
  • CVE-2002-32826 – AppleMobileFileIntegrity & System Events (Privilege Escalation)

On top of the above mentioned CVEs, the latest version of macOS fixes five security vulnerabilities in the SMB module.

So…when you can (hopefully soon) update to iOS 15.6, iPadOS 15.6, macOS Monterey 12.5 (BigSur 11.6.8, 2022-005 Catalina for older Macs), tvOS 15.6 and watchOS 8.7.

 

Carl Keyser is the Content Manager at Integris.

Keep reading

Strong Cybersecurity Postures: How to Unleash their Power

Strong Cybersecurity Postures: How to Unleash their Power

In the vast digital landscape where virtual dragons and sneaky trolls roam a strong cybersecurity posture has never been more important. Imagine a band of modern-day knights led by our protagonist, Alex. Armed with a trusty laptop and a cup of coffee, Alex navigates...

How to Spot a Phishing Attack in 2023

How to Spot a Phishing Attack in 2023

In 2023 cyber threats lurk behind every tree trunk in today's digital jungle, and cybersecurity awareness is more critical than ever. Among the craftiest of these threats are phishing attacks. Phishing attacks are cunningly engineered with social manipulation at their...

How to Choose an IT Consultant in Boulder, CO

Regardless of industry size or type, Boulder IT consultants play a massive role in the way companies in the Boulder area do business. While most companies may have their own in-house IT department, many of these departments are small and cannot handle all the...