The vulnerability affects IOMobileFramebuffer, a kernel extension for managing the screen framebuffer.
Apple has released patches for a zero-day vulnerability in iOS, iPadOS, and macOS. The company has received reports that the flaws may have been actively exploited.
CVE-2021-30807 exists in the IOMobileFramebuffer, which is a kernel extension used to manage the screen framebuffer. An attacker who successfully exploits the bug will be able to execute arbitrary code with kernel privileges, Apple says in the vulnerability disclosure, noting the memory corruption issue was addressed with improved memory handling.
Patches are available for iPhone 6s and later, all models of the iPad Pro, iPad Air 2 and later, iPad 5th generation and later, iPad mini 4 and later, and the 7th generation iPod touch. A fix is also available for macOS Big Sur 11.5.1.
Apple has credited an "anonymous researcher" with finding the vulnerability and has not specified who might be behind the exploits targeting the flaw. It has released separate disclosures for iOS and iPadOS, as well as macOS.
Reports indicate this is the 13th zero-day Apple has patched this year.
Read more details here.
About the Author(s)
You May Also Like
The fuel in the new AI race: Data
April 23, 2024Securing Code in the Age of AI
April 24, 2024Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise
April 30, 2024Key Findings from the State of AppSec Report 2024
May 7, 2024Is AI Identifying Threats to Your Network?
May 14, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024