June 1, 2023

Tech giants Apple, Microsoft, and Google every fastened main safety flaws in April, lots of which had been already being utilized in real-life assaults. Different corporations to subject patches embody privacy-focused browser Firefox and enterprise software program suppliers SolarWinds and Oracle.

Right here’s every part you have to know concerning the patches launched in April.


Scorching on the heels of iOS 16.4, Apple has launched the iOS 16.4.1 replace to repair two vulnerabilities already being utilized in assaults. CVE-2023-28206 is a matter within the IOSurfaceAccelerator that would see an app in a position to execute code with kernel privileges, Apple stated on its assist web page.

CVE-2023-28205 is a matter in WebKit, the engine that powers the Safari browser, that would result in arbitrary code execution. In each instances, the iPhone maker says, “Apple is conscious of a report that this subject might have been actively exploited.”

The bug means visiting a booby-trapped web site might give cybercriminals management over your browser—or any app that makes use of WebKit to render and show HTML content material, says Paul Ducklin, a safety researcher at cybersecurity agency Sophos.

The 2 flaws fastened in iOS 16.4.1 had been reported by Google’s Menace Evaluation Group and Amnesty Worldwide’s Safety Lab. Taking this into consideration, Ducklin thinks the safety holes might have been used for implanting spyware and adware.

Apple additionally launched iOS 15.7.5 for customers of older iPhones to repair the identical already exploited flaws. In the meantime, the iPhone maker issued macOS Ventura 13.3.1, Safari 16.4.1, macOS Monterey 12.6.5, and macOS Massive Sur 11.7.6.


Apple wasn’t the one huge tech agency issuing emergency patches in April. Microsoft additionally launched an pressing repair as a part of this month’s Patch Tuesday replace. CVE-2023-28252 is an elevation-of-privilege bug within the Home windows Widespread Log File System Driver. An attacker who efficiently exploited the flaw might acquire system privileges, Microsoft stated in an advisory.

One other notable flaw, CVE-2023-21554, is a distant code execution vulnerability in Microsoft Message Queuing labeled as having a important affect. To use the vulnerability, an attacker would want to ship a malicious MSMQ packet to an MSMQ server, Microsoft stated, which might lead to distant code execution on the server facet.

The repair was a part of a slew of patches for 98 vulnerabilities, so it’s price trying out the advisory and updating as quickly as attainable.

Google Android

Google has issued a number of patches for its Android working system, fixing a number of critical holes. Essentially the most extreme bug is a important safety vulnerability within the system element that would result in distant code execution with no extra execution privileges wanted, Google stated in its Android Safety Bulletin. Person interplay will not be wanted for exploitation.

The patched points embody 10 within the framework, together with eight elevation-of-privilege flaws, and 9 others rated as having a excessive severity. Google fastened 16 bugs within the system together with two important RCE flaws and several other points within the kernel and SoC elements.

The replace additionally contains a number of Pixel-specific patches, together with an elevation-of-privilege flaw within the kernel tracked as CVE-2023-0266. The Android April patch is out there for Google’s units in addition to fashions together with Samsung’s Galaxy S-series alongside the Fold and Flip-series.

Google Chrome

At the beginning of April, Google issued a patch to repair 16 points in its widespread Chrome browser, a few of that are critical. The patched flaws embody CVE-2023-1810, a heap buffer overflow subject in Visuals rated as having a excessive affect, and CVE-2023-1811, a use-after-free vulnerability in Frames. The remaining 14 safety bugs are rated as having a medium or low affect.

Mid-month, Google was pressured to subject an emergency replace, this time to repair two flaws, one in all which is already being utilized in real-life assaults. CVE-2023-2033 is a kind of confusion flaw within the V8 JavaScript engine. “Google is conscious that an exploit for CVE-2023-2033 exists within the wild,” the software program large stated on its weblog.

Simply days later, Google launched one other patch, fixing points together with one other zero-day flaw tracked as CVE-2023-2136, an integer overflow bug within the Skia graphics engine.

Leave a Reply

Your email address will not be published. Required fields are marked *