Apple Implements RTKit iOS Zero-Day Fix for Older iPhone Models

Apple has backported safety patches released in March to older iPhones and iPads, repairing an iOS Kernel zero-day classified as used in attacks. In protection advisories issued today, Apple once again expressed they're conscious of the information that this susceptibility "may have been vigorously used."

The fault is a memory corruption problem in Apple's RTKit real-time working system that allows assailants with random kernel read and note capacity to avoid kernel memory protections. The company has not yet attributed the finding of this safety exposure to a protection investigator. On March 5th, the company managed the zero-day susceptibility (followed as CVE-2024-23296) for more recent iPhone, iPad, and Mac models.

Today, Apple backported the March safety updates to manage this protection defect on iOS 16.7.8, iPadOS 16.7.8, and macOS Ventura 13.6.7 with improved information assurance. Today, Apple backported the March security updates to address this safety imperfection on iOS 16.7.8, iPadOS 16.7.8, and macOS Ventura 13.6.7 with an improved knowledge guarantee.

Three Exploited Zero-Day Vulnerabilities Patched in 2024 Attacks

Apple has yet to announce who revealed the zero-day or whether it was found internally, and it has supplied no details on the nature of the attacks manipulating it in the wild. Even though Apple has not released attributes about CVE-2024-23296 exploitation, iOS zero-days are generally utilized in state-sponsored spyware invasions targeting high-risk people, including reporters, heretics, and resistance politicians.

While this zero-day was probably only exploited in targeted invasions, it is highly recommended to establish today's safety updates as soon as possible to choke possible attack tries if you're utilizing an older iPhone or iPad model. Since the beginning of the year, Apple has appointed three zero-days: two in March (CVE-2024-23225 and CVE-2024-23296) and one in January (CVE-2024-23222).

In January, Apple also backported patches for two WebKit zero-days (CVE-2023-42916 and CVE-2023-42917), which were fixed in November for more recent devices. With today's iOS 17.5 update, Apple has also counted help for avoiding search alerts (Google established the same stuff on Android 6.0+ gadgets). These signs will alert users if Bluetooth tracking devices (AirTag, Find My Addition, or other enterprise specification-compatible Bluetooth trackers) are being utilized to follow their zone.