Apple fixes two iOS zero-days exploited in the wild

Apple fixes two iOS zero-days exploited in the wild

Apple has released security updates to patch three high-risk vulnerabilities in its iOS operating system, with two of the bugs being zero-day vulnerabilities that the Cupertino-based company says are being exploited in the wild.

The zero-days in question are CVE-2021-30761 and CVE-2021-30762. Both bugs affect the WebKit component in Apple iOS and allow remote code execution.

CVE-2021-30761 is a buffer overflow issue, which exists due to a boundary error when processing HTML content. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

CVE-2021-30762 is a use-after-free vulnerability, which exists due to a boundary error when processing HTML content within the WebKit component in Apple iOS. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger a use-after-free error and execute arbitrary code on the target system.

In addition, Apple has also patched CVE-2021-30737, which is a buffer overflow bug in ASN.1 decoder. The vulnerability exists due to a boundary error in the ASN.1 decoder when processing TLS certificates. A remote attacker can trick the victim to visit a specially crafted website, trigger memory corruption with a specially crafted TLS certificate and execute arbitrary code on the system.

The iOS 12.5.4 update is intended for iPhone 5s, iPhone 6, iPhone 6 Plus, iPad Air, iPad mini 2, iPad mini 3, and iPod touch (6th generation). All users are advised to update their devices as soon as possible.


Back to the list

Latest Posts

AI chatbots fall for phishing scams

AI chatbots fall for phishing scams

The models provided the correct URL only 66% of the time; nearly 30% of responses pointed users to dead or suspended domains.
3 July 2025
Chinese hackers exploited Ivanti flaws in attacks against French government

Chinese hackers exploited Ivanti flaws in attacks against French government

ANSSI believes that the Houken campaign is operated by ‘UNC5174’, an entity believed to act as an initial access broker for China’s Ministry of State Security.
2 July 2025
Threat actors exploit Vercel's AI tool v0 to build sophisticated phishing pages

Threat actors exploit Vercel's AI tool v0 to build sophisticated phishing pages

The malicious actors used v0.dev to create fake login pages mimicking legitimate brands.
2 July 2025