Multiple Vulnerabilities in Apple Products
Vulnerability
January 29, 2025
This Multi-State Information Sharing and Analysis Center (MS-ISAC) Advisory is being provided to assist agencies, organizations, and individuals in guarding against the persistent malicious actions of cybercriminals.
- Versions prior to visionOS 2.3
- Versions prior to iPadOS 17.7.4
- Versions prior to iOS 18.3 and iPadOS 18.3
- Versions prior to macOS Sequoia 15.3
- Versions prior to macOS Sonoma 14.7.3
- Versions prior to macOS Sequoia 15.3
- Versions prior to macOS Ventura 13.7.3
- Versions prior to watchOS 11.3
- Versions prior to tvOS 18.3
- Versions prior to Safari 18.3
Government:
– Small business entities: Medium
- Apply the stable channel update provided by Apple to vulnerable systems immediately after appropriate testing.
- Apply the Principle of Least Privilege to all systems and services. Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack.
- Restrict use of certain websites, block downloads/attachments, block JavaScript, restrict browser extensions, etc.
- Use capabilities to detect and block conditions that may lead to or be indicative of a software exploit occurring.
- Block execution of code on a system through application control, and/or script blocking.
- Use capabilities to prevent suspicious behavior patterns from occurring on endpoint systems. This could include suspicious process, file, API call, etc. behavior.
References
Apple:
https://support.apple.com/en-
https://support.apple.com/en-
https://support.apple.com/en-
https://support.apple.com/en-
https://support.apple.com/en-
https://support.apple.com/en-
https://support.apple.com/en-
https://support.apple.com/en-
https://support.apple.com/en-
https://support.apple.com/en-