Apple Addresses Critical Zero-Day Vulnerabilities Affecting Intel-Based Macs
Apple has addressed two critical zero-day vulnerabilities that were actively exploited by attackers to target Intel-based Macs. The flaws resided in macOS Sequoia’s JavaScriptCore (CVE-2024-44308) and WebKit (CVE-2024-44309) components.
The more severe vulnerability, identified as CVE-2024-44308, could enable attackers to execute malicious code remotely via specially crafted web content. By contrast, the other flaw (CVE-2024-44309) could be leveraged for cross-site scripting (XSS) attacks.
These patches are included in macOS Sequoia 15.1.1, iOS 17.7.2 and iPadOS 17.7.2, iOS 18.1.1 and iPadOS 18.1.1, and visionOS 2.1.1. Notably, this brings the total number of zero-day vulnerabilities that Apple has patched so far in 2024 to six.
It is crucial for users to update their devices to the latest software versions at the earliest convenience to safeguard themselves from these vulnerabilities. Here’s how to update your Apple device:
- For macOS devices, navigate to System Preferences > Software Update.
- On iPhones and iPads, go to Settings > General > Software Update.
By keeping your software up-to-date, you can ensure that your device is protected against the latest security threats.
Get In Touch
Share On Social Media
Other Recent Blog Articles
Phishing Scams: The Sneaky Threat Lurking in Portland’s Small Businesses – How PDX IT Services Can Help
In the bustling small business landscape of Portland, Oregon, every entrepreneur is focused on growth, innovation, and serving their community. But lurking in the shadows, a persistent and increasingly sophisticated…
Read MoreFrom “Oh No!” to “We Got This!”: Navigating Business Continuity & Disaster Recovery
Business Continuity vs. Disaster Recovery: A Holistic View At its core, Disaster Recovery (DR) is a subset of Business Continuity (BC). Think of BC as the overarching strategy that ensures…
Read More5 Cybersecurity Tips for Small Businesses
In today’s digital age, cyber threats are a constant concern for businesses of all sizes. Small businesses, often with limited resources, can be particularly vulnerable. A single data breach can…
Read More