Apple pushed out the updates for the vulnerability, known officially as CVE-2021-30860. The researchers said the exploit takes advantage of a weakness in how Apple devices render images on the display.Ĭitizen Lab now says that the same ForcedEntry exploit works on all Apple devices running, until today, the latest software.Ĭitizen Lab said it reported its findings to Apple on September 7. In its latest findings, Citizen Lab said it found evidence of the ForcedEntry exploit on the iPhone of a Saudi activist, running at the time the latest version of iOS. Citizen Lab calls this particular exploit ForcedEntry for its ability to skirt Apple’s BlastDoor protections. But also the exploit broke through new iPhone defenses that Apple had baked into iOS 14, dubbed BlastDoor, which were supposed to prevent silent attacks by filtering potentially malicious code. The breach was significant because the flaws exploited the latest iPhone software at the time, both iOS 14.4 and later iOS 14.6, which Apple released in May. NSO used real people’s location data to pitch its contact-tracing tech.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |