Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.

MacRumors

macrumors bot
Original poster
Apr 12, 2001
68,126
38,887


The macOS 13.5.2, iOS 16.6.1, iPadOS 16.6.1, and watchOS 9.6.2 updates that Apple released today includes fixes for security vulnerabilities that Apple says may have been actively exploited in the wild.

macbook-air-purple.jpg

According to Apple's security support page, in iOS, iPadOS, and macOS, processing a maliciously crafted image could lead to arbitrary code execution, allowing a hacker to gain access to the operating system with a simple picture. Apple fixed the ImageIO process by addressing a buffer overflow issue to improve memory handling.

In iOS, iPadOS, and watchOS, a maliciously crafted attachment in the Wallet app could also lead to arbitrary code execution. Apple addressed the validation issue with improved logic.

As these updates include important security fixes, everyone should install iOS 16.6.1, iPadOS 16.6.1, macOS 13.5.2, and watchOS 9.6.2 as soon as possible. Apple recommends these software updates for all users.

Update: As reported by Citizen Lab, the vulnerabilities are part of a "BLASTPASS" exploit chain that was observed having been used in the wild to deliver NSO Group's Pegasus spyware. Pegasus is of critical concern to government officials, journalists, activists, and others with potentially sensitive information on their devices.

The zero-click vulnerability allowed attackers to send a maliciously crafted PassKit (Wallet) image to a target via iMessage, infecting their device "without any interaction from the victim."

The attacks can be blocked by applying today's updates or by enabling Lockdown Mode on your device.

Article Link: PSA: Make Sure to Update, iOS 16.6.1 and macOS 13.5.2 Address Actively Exploited Vulnerability
 
Last edited:
So what's the difference between these updates and the automatic behind-the-scenes thing that is supposed to keep us all safe without us having to do anything?
Assuming you are talking about XProtect and MRT, think of those as Antivirus software. They look for specific application or signatures that may be running on your computer and prevent the process from running. But Apple only updates for known malware.

These patches are patching an exploit in the Operating System, thus preventing new malware from attacking the exploit,.
 
Is this vulnerability found in prior OS versions? I'm in iOS 15 and it always confuses me when they don't mention explicitly if the vulnerability was introduced in the current series (ie. iOS 16) or goes back further but that they won't support it with a minor update. Apple does have a track record of sometimes releasing updates for prior iOS series so that's why I am not always clear.
 
For those of us who are stuck on an unsupported Mac OS version due to financial reasons, any details on how this image exploit is used so we can try to avoid it? Is it as simple as someone emailing you an image embedded into the body? Or an attachment you have to open?

I found an image that clearly demonstrates the procedure for solving your issue, But be sure to close your eyes when you view this image to avoid being hacked.

unplug.jpg
 
For those of us who are stuck on an unsupported Mac OS version due to financial reasons, any details on how this image exploit is used so we can try to avoid it? Is it as simple as someone emailing you an image embedded into the body? Or an attachment you have to open?
No further details have been published so far, but it reads like any processing of an image by ImageIO can trigger an exploit. That almost certainly includes displaying images in an email.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.