{"id":8617,"date":"2021-08-09T05:12:44","date_gmt":"2021-08-09T12:12:44","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?post_type=patch_watch&p=8617"},"modified":"2023-03-03T14:29:33","modified_gmt":"2023-03-03T21:29:33","slug":"july-apple-patches-52-security-vulnerabilities","status":"publish","type":"patch_watch","link":"https:\/\/webdev.securin.xyz\/patch_watch\/july-apple-patches-52-security-vulnerabilities\/","title":{"rendered":"July: Apple Patches 52 Security Vulnerabilities"},"content":{"rendered":"
Apple had released security patches to address 52 unique vulnerabilities in July, which includes two zero-day exploits. We analyzed these weaknesses and spotlighted the most important vulnerabilities that ought to be fixed on priority.<\/p>\n
<\/p>\n
The 52 vulnerabilities that were patched in July include<\/p>\n
7 CVEs classified as Remote Code Execution bugs<\/p>\n<\/li>\n
9 CVEs have Privilege Escalation capabilities<\/p>\n<\/li>\n
15 CVEs linked to Buffer Overflow<\/p>\n<\/li>\n
2 CVEs with Denial of Service<\/p>\n<\/li>\n
14 CVEs are Arbitrary Code Execution<\/p>\n<\/li>\n<\/ul>\n
Interestingly, CISA had issued three alerts this July urging all Apple users to address and update the recently patched security vulnerabilities in multiple products.<\/p>\n
<\/p>\n
This July, Apple released an update for a dangerous new zero-day bug (CVE-2021-30807) that exists in iOS 14.7. This vulnerability is described as a memory corruption issue that determines how an application manager controls the display of a device. For instance, any malware that resides in an application can leverage and take complete control of the device.<\/p>\n
CVE-2021-30807 is considered to be the thirteenth zero-day flaw covered by Apple in 2021. Given the public availability of a proof-of-concept (PoC) exploit, users should upgrade their devices to the most recent version as soon as possible to minimize the risk associated with the issue.<\/p>\n
<\/p>\n
<\/p>\n
Another zero-day vulnerability in iOS tracked as CVE-2021-30800 was fixed. This vulnerability is named \u201cWIFIDemon\u201d and is considered to be a severe bug that could lead to denial of service or arbitrary code execution. Therefore, we recommend you immediately update your iOS device to iOS 14.7 to secure it from WiFiDemon attacks.<\/p>\n
It’s also a zero-click vulnerability that allows a threat actor to infect a device without requiring any user input, although it does require the setting to be enabled to join Wi-Fi networks automatically.<\/p>\n
Additionally, two more zero-day (CVE-2021-30761, CVE-2021-30762) vulnerabilities that were patched in early June received a second patch this July. These two vulnerabilities are found in Webkit Storage that leads to arbitrary code execution.<\/p>\n
We have seven old vulnerabilities patched in Apple this July, ranging from the year 2018 to 2020.<\/p>\n
All of these vulnerabilities have been rated critical and accredited with a CVSS v3 score of 9.1 to 9.8.<\/p>\n<\/li>\n
6 CVEs are classified as Buffer Overflow bugs and one is of Remote Code Execution.<\/p>\n<\/li>\n
Of these, 6 CVEs are categorized under the 2021 CWE Top 25 Most Dangerous Software Weaknesses<\/a> published by MITRE.<\/p>\n<\/li>\n<\/ul>\n <\/p>\n