Apple Hit By 2 No-Click Zero-Days in Blastpass Exploit Chain

Researchers at Citizen Lab recommend immediately updating any iPhones and iPads to the latest OSes.

Dark Reading Staff, Dark Reading

September 7, 2023

1 Min Read
A person holding an iPhone that is updating
Source: Adobe Stock

Citizen Lab discovered two no-click zero-day vulnerabilities while checking an unidentified individual's device, which was delivering mercenary spyware from NSO Group's Pegasus.

Citizen Lab disclosed this information to Apple immediately and has assisted with the investigation. Apple, in turn, added two CVEs to this exploit chain: CVE-2023-41064 and CVE-2023-41061.

Researchers at Citizen Lab are calling the exploit chain "Blastpass," which can compromise iPhones running iOS 16.6.1 and tablets running iPadOS 16.6.1 without any victim interaction. "Processing a maliciously crafted image may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited," the company said in a statement.

This vulnerability has been addressed in Apple's most recent round of patches, and researchers recommend users update their devices. Those who are at extremely high risk due to their identity or profession should enable lockdown mode, an extreme protection measure for those who might be targeted in sophisticated digital threats, though few are ever attacked in such a manner. 

About the Author(s)

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights