Beware iPhone users! Indian government issues a high severity warning for Apple products; Check details

The Indian Computer Emergency Response Team or CERT-In has issued a high severity warning for iPhone and iPad users due to vulnerabilities that could allow a hacker to make your device stop working, access sensitive information, and get around security measures.

Beware iPhone users! Indian government issues a high severity warning for Apple products; Check details gcw

CERT-In or the Indian Computer Emergency Response Team, has issued a high severity for Apple iOS and iPad OS devices. The warning is available on the official CERT-In website and was issued on March 15. Multiple vulnerabilities in Apple iOS and iPadOS have been discovered, according to the alert. These flaws might allow an attacker to take control of the system and make it stop operating, execute any code they want, access private data, and circumvent security protections.

According to the CERT-In website, the flaw "allows an attacker to trigger denial of service condition, execute arbitrary code, disclose sensitive information, and bypass security restrictions on the targeted system."

The security flaw impacts iOS and iPadOS versions earlier than 16.7.6 for devices like iPhone 8, iPhone 8 Plus, iPhone X, iPad 5th generation, iPad Pro 9.7-inch, and iPad Pro 12.9-inch 1st generation.  Additionally, it affects versions prior to v17.4 for the following devices: iPad Air 3rd generation and up, iPad 6th generation and up, iPad mini 5th generation and up, iPhone XS and up, iPad Pro 12.9-inch 2nd generation and up, iPad Pro 10.5-inch, and iPad Pro 11-inch 1st generation and up.

According to CERT-In, problems with Bluetooth, libxpc, MediaRemote, Photos, Safari, and WebKit are the result of "improper validation" in these components of Apple's iOS and iPadOS. The ExtensionKit, Messages, Share Sheet, Synapse, and Notes sections all have privacy issues.

Another problem is that ImagelO can get too full, and the kernel & RTKit parts can have memory mistakes. 

Exploiting these vulnerabilities could lead to causing system failures, executing unauthorised code, accessing private information, and bypassing security measures.

Latest Videos
Follow Us:
Download App:
  • android
  • ios