Apple Addresses Zero-Day Flaws Exploited in the Wild
Threat Level – Red | Vulnerability Report
Download PDFApple addressed three zero-day vulnerabilities used in an iPhone exploit chain to deliver the Predator spyware. The vulnerabilities involved were CVE-2023-41991, CVE-2023-41992, and CVE-2023-41993. These vulnerabilities enabled attackers to bypass certificate validation, escalate privileges, and execute remote code on the targeted devices by using specially crafted web content.
What’s new on HivePro
Get through updates and upcoming events, and more directly in your inbox