Feds take notice of iOS vulnerabilities exploited under mysterious circumstances

Feds take notice of iOS vulnerabilities exploited under mysterious circumstances

As an Amazon Associate I earn from qualifying purchases.

Woodworking Plans Banner

Coruna is likewise noteworthy for its usage by 3 unique hacking groups. Google initially discovered its usage in February of in 2015 in an operation carried out by a “consumer of a security supplier.” The vulnerability made use of, tracked as CVE-2025-23222, had actually been covered 13 months previously. In July 2025, a “believed Russian espionage group” made use of CVE-2023-43000 in attacks planted on sites that were often visited by Ukrainian targets. Last December, when it was utilized by a “economically determined risk star from China,” Google had the ability to obtain the total make use of package. “How this expansion happened is uncertain, however recommends an active market for ‘previously owned’ zero-day exploits,” Google composed. “Beyond these recognized exploits, several danger stars have actually now obtained innovative exploitation strategies that can be re-used and customized with recently recognized vulnerabilities.” Google scientists went on to compose: 19659004 We recovered all the obfuscated exploits, consisting of ending payloads. Upon more analysis, we saw a circumstances where the star released the debug variation of the make use of set, leaving in the clear all of the exploits, including their internal code word. That’s when we discovered that the make use of package was most likely called Coruna internally. In overall, we gathered a couple of hundred samples covering an overall of 5 complete iOS make use of chains. The make use of set has the ability to target different iPhone designs running iOS variation 13.0 (launched in September 2019) approximately variation 17.2.1 (launched in December 2023). The 23 exploits, together with the code word and other info, are: 19659007 Type 19659008 Codename 19659009 Targeted variations (inclusive) 19659010 Repaired variations 19659011 CVE 19659012 WebContent R/W buffout 13 → 15.1.1 15.2 CVE-2021-30952 19659017 WebContent R/W jacurutu 19659019 15.2 → 15.5 15.6 19659021 CVE-2022-48503 19659022 WebContent R/W bluebird 19659024 15.6 → 16.1.2 16.2 No CVE WebContent R/W 19659028 terrorbird 16.2 → 16.5.1 16.6 CVE-2023-43000 19659032 WebContent R/W 19659033 cassowary 16.6 → 17.2.1 16.7.5, 17.3 19659036 CVE-2024-23222 WebContent PAC bypass 19659038 breezy 19659039 13 → 14.x 19659041 No CVE 19659042 WebContent PAC bypass 19659043 breezy15 19659044 15 → 16.2 No CVE 19659047 WebContent PAC bypass seedbell 19659049 16.3 → 16.5.1 19659050 19659051 No CVE 19659052 WebContent PAC bypass seedbell_16_6 19659054 16.6 → 16.7.12 19659055 19659056 No CVE WebContent PAC bypass 19659058 seedbell_17 19659059 17 → 17.2.1 No CVE 19659062 WebContent sandbox escape IronLoader 19659064 16.0 → 16.3.1 16.4.0 (<<=A12) 15.7.8, 16.5 CVE-2023-32409 WebContent sandbox escape 19659069 NeuronLoader 16.4.0 → 16.6.1 (A13-A16) 19659071 17.0 19659072 No CVE PE 19659074 Neutron 13.X 19659076 14.2 19659077 CVE-2020-27932 19659078 PE (infoleak) Eager beaver 13.X 14.2 CVE-2020-27950 PE Pendulum 19659085 14 → 14.4.x 14.7 No CVE 19659088 PE Photon 19659090 14.5 → 15.7.6 15.7.7, 16.5.1 CVE-2023-32434 PE Parallax 19659095 16.4 → 16.7 19659096 17.0 CVE-2023-41974 PE 19659099 Gruber 15.2 → 17.2.1 19659101 16.7.6, 17.3 No CVE 19659103 PPL Bypass 19659104 Quark 13.X 19659106 14.5 No CVE 19659108 PPL Bypass Gallium 14.x 19659111 15.7.8, 16.6 19659112 CVE-2023-38606 19659113 PPL Bypass Carbone 15.0 → 16.7.6 19659116 17.0 19659117 No CVE PPL Bypass Sparrow 17.0 → 17.3 16.7.6 19659122, 17.4 19659123 CVE-2024-23225 19659124 PPL Bypass 19659125 Rocket 19659126 17.1 → 17.4 19659127 16.7.8, 17.5 CVE-2024-23296 CISA is including just 3 of the CVEs to its brochure. They are: CVE-2021-30952 Apple Multiple Products Integer Overflow or Wraparound Vulnerability 19659131 CVE-2023-41974 Apple iOS and iPadOS Use-After-Free Vulnerability CVE-2023-43000 Apple Multiple items Use-After-Free Vulnerability CISA is directing companies to “use mitigations per supplier guidelines, follow appropriate … assistance for cloud services, or terminate usage of the item if mitigations are not available.” The firm went on to caution: “These kinds of vulnerabilities are regular attack vectors for harmful cyber stars and position substantial threats to the federal business.” Find out more

As an Amazon Associate I earn from qualifying purchases.

You May Also Like

About the Author: tech