Apple’s iOS and Google Chrome Updates Correct Really serious Safety Flaws

August was a bumper thirty day period for safety patches, with Apple, Google, and Microsoft among the firms issuing crisis fixes for already exploited vulnerabilities. The thirty day period also noticed some huge fixes arriving from the likes of VMWare, Cisco, IBM, and Zimbra.

Here’s anything you need to have to know about the important stability fixes issued in August.

Apple iOS 15.6.1

After a two-thirty day period patch hiatus, adopted by a number of fixes in July, Apple introduced an crisis protection update in August with iOS 15.6.1. The iOS update mounted two flaws, both equally of which ended up remaining used by attackers in the wild.

It is considered that the vulnerabilities in WebKit (CVE-2022-32893) and the Kernel (CVE-2022-32894) ended up staying chained with each other in assaults, with really serious implications. A prosperous assault could enable an adversary to take regulate of your Apple iphone and accessibility your sensitive files and banking details.

Combining the two flaws “usually delivers all the performance wanted to mount a machine jailbreak,” bypassing practically all Apple-imposed security limitations, Paul Ducklin, a principal study scientist at Sophos, wrote in a web site analyzing the vulnerabilities. This would perhaps allow adversaries to “install background spy ware and keep you less than comprehensive surveillance,” Ducklin described.

Apple generally avoids giving out facts about vulnerabilities right up until most people today have updated, so it’s hard to know who the attack targets have been. To assure you are safe, you should really update your gadgets to iOS 15.6.1 with out delay.

Apple also produced iPadOS 15.6.1, watchOS 8.7.1, and macOS Monterey 12.5.1, all of which you should really update at the subsequent option.

Google Chrome

Google launched a protection update in August to resolve its fifth zero-working day flaw this 12 months. In an advisory, Google detailed 11 vulnerabilities fastened in August. The patches contain a use-following-totally free flaw in FedCM—tracked as CVE-2022-2852 and rated as critical—as properly as 6 remarkably rated issues and a few categorised as getting a medium effects. One particular of the extremely rated vulnerabilities has been exploited by attackers, CVE-2022-2856,

Google has not delivered any detail about the exploited flaw, but considering the fact that attackers have gotten ahold of the facts, it truly is a great strategy to update Chrome now.

Before in August, Google introduced Chrome 104, fixing 27 vulnerabilities, seven of which had been rated as owning a high impact.

Google Android

The August Android protection patch was a significant 1, with dozens of fixes for really serious vulnerabilities, which include a flaw in the framework that could lead to regional privilege escalation with no extra privileges necessary. Meanwhile, an situation in the media framework could lead to distant info disclosure, and a flaw in the procedure could guide to remote code execution around Bluetooth. A vulnerability in kernel elements could also guide to area escalation of privileges.

The Android stability patch was late in August, but it can be now readily available on these types of units as Google’s Pixel varythe Nokia T20and Samsung Galaxy equipment (which include the Galaxy S series, Galaxy Take note collection, Galaxy Fold sequence, and Galaxy Flip series).


Microsoft’s August Patch Tuesday fixed about 100 stability flaws, of which 17 are rated as essential. Amongst the fixes was a patch for an now exploited flaw tracked as CVE-2022-34713also recognized as DogWalk.

The distant code execution (RCE) flaw in the Home windows Assistance Diagnostic Resource (MDST) is rated as possessing a substantial effect since exploiting it can consequence in a program compromise. The vulnerability, which impacts all consumers of Home windows and Windows Server, was first uncovered above two years back in January 2020, but Microsoft failed to take into consideration it a protection difficulty at the time.


VMWare set a bunch of flaws in August, like a significant authentication bypass bug tracked as CVE-2022-31656, On releasing the patch, the software business warned that community exploit code is available.

VMWare also set an RCE vulnerability in VMware Workspace Just one Access, Identity Manager, and Aria Automation (previously vRealize Automation), tracked as CVE-2022-31658 with a CVSS score of 8. Meanwhile, a SQL injection RCE vulnerability identified in VMware Workspace Just one Accessibility and Identification Manager also acquired a CVSS rating of eight. Both require an attacker to have administrator and network entry before they can cause distant code execution.

- Advertisement -

- Advertisement -

Comments are closed.