Tuesday, June 17, 2025
HomeTechnologyApple Discovers Zero-Day Exploit in Browser Engine Days After Google Discovery

Apple Discovers Zero-Day Exploit in Browser Engine Days After Google Discovery

Apple has patched an actively exploited zero-day bug in its WebPackage browser engine for Safari.

The bug, assigned as CVE-2024-23222stems from a sort confusion errorwhich mainly is what occurs when an utility incorrectly assumes the enter it receives is of a sure sort with out truly validating — or incorrectly validating — that to be the case.

Actively Exploited

Apple yesterday described the vulnerability as one thing an attacker might exploit to execute arbitrary code on affected techniques. “Apple is conscious of a report that this situation might have been exploited,” the corporate’s advisory famous, with out providing any additional particulars.

The firm has launched up to date variations of iOS, iPadOS, macOS, iPadOS, and tvOS with further validation checks to handle the vulnerability.

CVE-2024-23222 is the primary zero-day vulnerability that Apple has disclosed in WebPackage in 2024. Last 12 months, the corporate disclosed a complete of 11 zero-day bugs within the know-how — its most ever in a single calendar 12 months. Since 2021, Apple has disclosed a complete of twenty-two WebPackage zero-day bugs, highlighting the rising curiosity within the browser from each researchers and attackers.

In parallel, Apple’s disclosure of the brand new WebPackage zero-day follows on Google’s disclosure final week of a zero-day in Chrome. It marks a minimum of the third time in current months the place each distributors have disclosed zero-days of their respective browsers in shut proximity to one another. The development means that researchers and attackers are probing virtually equally for flaws in each applied sciences, most likely as a result of Chrome and Safari are additionally probably the most broadly used browsers.

The Spying Threat

Apple has not disclosed the character of the exploit exercise concentrating on the newly disclosed zero-day bug. But researchers have reported seeing business adware distributors abusing a few of the firm’s newer ones, to drop surveillance software program on iPhones of goal topics.

In September 2023, Toronto University’s Citizen Lab warned Apple about two no-click zero-day vulnerabilities in iOS {that a} vendor of surveillance software program had exploited to drop the Predator adware instrument on an iPhone belonging to an worker at a Washington, DC-based group. The similar month, Citizen Lab researchers additionally reported a separate zero-day exploit chain — which included a Safari bug — they’d found concentrating on iOS gadgets.

Google has flagged related considerations in Chrome, virtually in tandem with Apple, on a number of events just lately. In September 2023, as an example, close to the identical time Apple disclosed its zero-day bugs, researchers from Google’s risk evaluation group recognized a business software program firm known as Intellexa as creating an exploit chain — which included a Chrome zero-day (CVE-2023-4762) — to put in Predator on Android gadgets. Just a number of days earlier, Google had disclosed one other zero-day in Chrome (CVE-2023-4863) in the identical picture processing library during which Apple had disclosed a zero-day.

Lionel Litty, chief safety architect at browser safety agency Menlo Security, says it is laborious to say if there’s any connection between Google and Apple’s first browser zero-days for 2024, given the restricted data presently obtainable. “The Chrome CVE was within the JavaScript engine (v8) and Safari makes use of a unique JavaScript engine,” Litty says. “However, it isn’t unusual for various implementations to have very related flaws.”

Once attackers have discovered a smooth spot in a single browser, they’re additionally recognized to probe different browsers in the identical space, Litty says. “So, whereas it is unlikely that that is the very same vulnerability, it would not be too stunning if there was some shared DNA between the 2 in-the-wild exploits.”

Explosion in Zero-Hour Browser-Based Phishing Attacks

Surveillance distributors are, by far, not the one ones attempting to take advantage of browser vulnerabilities and browsers normally. According to a soon-to-be-released report from Menlo Security, there was a 198% improve in browser-based phishing assaults within the second half of 2023 in comparison with the primary six months of the 12 months. Evasive assaults — a class that Menlo describes as utilizing strategies to evade conventional safety controls — surged even increased, by 206%, and accounted for 30% of all browser-based assaults within the second half of 2023.

Over a 30-day interval, Menlo says it noticed greater than 11,000 so-called “zero-hour” browser-based phishing assaults to evade Secure Web Gateway and different endpoint risk detection instruments.

“The browser is the enterprise utility enterprises cannot stay with out, nevertheless it has fallen behind from a safety and manageability perspective,” Menlo mentioned within the upcoming report.

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Most Popular