{"id":902,"date":"2024-03-06T19:53:35","date_gmt":"2024-03-06T17:53:35","guid":{"rendered":"https:\/\/techlance.ddns.net\/?p=902"},"modified":"2024-03-06T19:53:46","modified_gmt":"2024-03-06T17:53:46","slug":"apple-korjasi-kaksi-uutta-iosn-nollapaivahaavoittuvuutta","status":"publish","type":"post","link":"https:\/\/techlance.ddns.net\/en\/apple-korjasi-kaksi-uutta-iosn-nollapaivahaavoittuvuutta\/","title":{"rendered":"Apple korjasi kaksi uutta iOS:n nollap\u00e4iv\u00e4haavoittuvuutta"},"content":{"rendered":"<p>Apple korjasi kaksi uutta iOS:n nollap\u00e4iv\u00e4haavoittuvuutta, joita hy\u00f6dynnettiin iPhoneihin kohdistuneissa hy\u00f6kk\u00e4yksiss\u00e4<\/p>\n\n\n\n<p>Apple julkaisi h\u00e4t\u00e4tilap\u00e4ivityksi\u00e4 korjatakseen kaksi iOS:n nollap\u00e4iv\u00e4haavoittuvuutta, joita oli hy\u00f6dynnetty iPhoneihin kohdistuneissa hy\u00f6kk\u00e4yksiss\u00e4. &#8221;Apple on tietoinen raportista, jonka mukaan t\u00e4t\u00e4 ongelmaa on saatettu hy\u00f6dynt\u00e4\u00e4,&#8221; yhti\u00f6 sanoi tiistaina julkaistussa neuvonnassa. N\u00e4m\u00e4 kaksi bugia l\u00f6ydettiin iOS:n ytimess\u00e4 (CVE-2024-23225) ja RTKitiss\u00e4 (CVE-2024-23296), ja molemmat mahdollistivat hy\u00f6kk\u00e4\u00e4jille mielivaltaiset ytimen luku- ja kirjoituskyvyt ytimen muistisuojauksen ohittamiseksi.<\/p>\n\n\n\n<p>Yhti\u00f6 kertoo k\u00e4sitelleens\u00e4 tietoturvapuutteet laitteissa, joissa on k\u00e4yt\u00f6ss\u00e4 iOS 17.4, iPadOS 17.4, iOS 16.76 ja iPad 16.7.6, parannetun sy\u00f6tteen validoinnin avulla. Apple ei ole jakanut tietoa siit\u00e4, kuka paljasti molemmat nollap\u00e4iv\u00e4t tai l\u00f6ydettiink\u00f6 ne sis\u00e4isesti. Vaikka Apple ei ole julkistanut tietoja k\u00e4ynniss\u00e4 olevasta hyv\u00e4ksik\u00e4yt\u00f6st\u00e4 luonnossa, iOS:n nollap\u00e4iv\u00e4haavoittuvuuksia k\u00e4ytet\u00e4\u00e4n yleisesti valtiollisen vakoiluohjelmiston hy\u00f6kk\u00e4yksiss\u00e4 korkean riskin henkil\u00f6it\u00e4, kuten toimittajia, oppositiopoliitikkoja ja dissidenttej\u00e4 vastaan.<\/p>\n\n\n\n<p>Apple released emergency security updates to fix two iOS zero-day vulnerabilities that were exploited in attacks on iPhones. &#8221;Apple is aware of a report that this issue may have been exploited,&#8221; the company said in an advisory issued on Tuesday. The two bugs were found in the iOS Kernel (CVE-2024-23225) and RTKit (CVE-2024-23296), both allowing attackers with arbitrary kernel read and write capabilities to bypass kernel memory protections. The company says it addressed the security flaws for devices running iOS 17.4, iPadOS 17.4, iOS 16.76, and iPad 16.7.6 with improved input validation. Apple has not shared who disclosed both zero-days or if they were discovered internally. While Apple has not released information regarding ongoing exploitation in the wild, iOS zero-day vulnerabilities are commonly used in state-sponsored spyware attacks against high-risk individuals, such as journalists, opposition politicians, and dissidents.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/apple\/apple-fixes-two-new-ios-zero-days-exploited-in-attacks-on-iphones\/\">https:\/\/www.bleepingcomputer.com\/news\/apple\/apple-fixes-two-new-ios-zero-days-exploited-in-attacks-on-iphones\/<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Apple korjasi kaksi uutta iOS:n nollap\u00e4iv\u00e4haavoittuvuutta, joita hy\u00f6dynnettiin iPhoneihin kohdistuneissa hy\u00f6kk\u00e4yksiss\u00e4 Apple julkaisi h\u00e4t\u00e4tilap\u00e4ivityksi\u00e4 korjatakseen kaksi iOS:n nollap\u00e4iv\u00e4haavoittuvuutta, joita oli [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[9],"tags":[15],"class_list":["post-902","post","type-post","status-publish","format-standard","hentry","category-security","tag-tietoturva"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/techlance.ddns.net\/en\/wp-json\/wp\/v2\/posts\/902","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techlance.ddns.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techlance.ddns.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techlance.ddns.net\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/techlance.ddns.net\/en\/wp-json\/wp\/v2\/comments?post=902"}],"version-history":[{"count":0,"href":"https:\/\/techlance.ddns.net\/en\/wp-json\/wp\/v2\/posts\/902\/revisions"}],"wp:attachment":[{"href":"https:\/\/techlance.ddns.net\/en\/wp-json\/wp\/v2\/media?parent=902"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techlance.ddns.net\/en\/wp-json\/wp\/v2\/categories?post=902"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techlance.ddns.net\/en\/wp-json\/wp\/v2\/tags?post=902"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}