{"id":92943,"date":"2021-01-26T20:17:49","date_gmt":"2021-01-27T04:17:49","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=92943"},"modified":"2021-01-29T13:59:09","modified_gmt":"2021-01-29T21:59:09","slug":"apple-patches-actively-exploited-security-flaws-in-ios-ipados","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-actively-exploited-security-flaws-in-ios-ipados\/","title":{"rendered":"Apple patches actively exploited security flaws in iOS, iPadOS"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-86452\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/03\/ios-software-update-available-icon-600x300-e1558142227486.png\" alt=\"\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/03\/ios-software-update-available-icon-600x300-e1558142227486.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/03\/ios-software-update-available-icon-600x300-e1558142227486-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/03\/ios-software-update-available-icon-600x300-e1558142227486-300x150.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>On Tuesday, January 26, Apple released iOS and iPadOS version 14.4, which address at least <a href=\"https:\/\/support.apple.com\/en-us\/HT212146\" target=\"_blank\" rel=\"noopener\">three zero-day vulnerabilities<\/a> that have been actively exploited in the wild, as well as updates for watchOS and tvOS. Here&#8217;s a brief overview of the security flaws and what Apple has done to fix them.<\/p>\n<h3>The WebKit bugs<\/h3>\n<p><img loading=\"lazy\" class=\"alignright size-full wp-image-89236\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/08\/Apple-Safari-browser-iOS-12-icon.png\" alt=\"\" width=\"128\" height=\"128\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/08\/Apple-Safari-browser-iOS-12-icon.png 512w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/08\/Apple-Safari-browser-iOS-12-icon-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/08\/Apple-Safari-browser-iOS-12-icon-300x300.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/08\/Apple-Safari-browser-iOS-12-icon-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/08\/Apple-Safari-browser-iOS-12-icon-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/08\/Apple-Safari-browser-iOS-12-icon-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/08\/Apple-Safari-browser-iOS-12-icon-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/08\/Apple-Safari-browser-iOS-12-icon-128x128.png 128w\" sizes=\"(max-width: 128px) 100vw, 128px\" \/>Two of the three zero-day bugs were addressed in WebKit\u2014Apple&#8217;s page rendering engine, which is used by Apple&#8217;s Safari browser and many parts of Apple operating systems.<\/p>\n<p>Apple says that because of these twin WebKit bugs, &#8220;A remote attacker may be able to cause arbitrary code execution. <strong>Apple is aware of a report that this issue may have been actively exploited.<\/strong>&#8221; The company says it fixed the issue by addressing a &#8220;logic issue [\u2026] with improved restrictions.&#8221;<\/p>\n<p>Reading between the lines, it sounds as though a victim&#8217;s iPhone or iPad could have been compromised (i.e. hacked) or exploited by an attacker, simply by the victim viewing a page or opening an e-mail created or modified by an attacker. Notably, this kind of attack may not necessarily\u00a0require the victim to click on a link within the theoretical page or e-mail.<\/p>\n<h3>The kernel bug<\/h3>\n<p><img loading=\"lazy\" class=\"alignright size-full wp-image-92946\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/01\/kernel-bug-maize-weevil-usda-300x455-1.jpg\" alt=\"kernel bug (maize weevil on a corn kernel)\" width=\"128\" height=\"194\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/01\/kernel-bug-maize-weevil-usda-300x455-1.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/01\/kernel-bug-maize-weevil-usda-300x455-1-198x300.jpg 198w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/01\/kernel-bug-maize-weevil-usda-300x455-1-99x150.jpg 99w\" sizes=\"(max-width: 128px) 100vw, 128px\" \/>Apple has also fixed a serious flaw in the kernel, the core component of Apple&#8217;s operating systems.<\/p>\n<p>According to the company, &#8220;A malicious application may be able to elevate privileges. <strong>Apple is aware of a report that this issue may have been actively exploited.<\/strong>&#8221;<\/p>\n<p>Regarding the fix, Apple says that: &#8220;A race condition was addressed with improved locking.&#8221;<\/p>\n<p>A\u00a0<strong>race condition<\/strong> is a scenario in which a task or procedure can be done out of the proper order. Race conditions can sometimes enable an attacker to do things they shouldn&#8217;t be able to do under normal circumstances.<\/p>\n<p>A <strong>privilege elevation<\/strong> (or <strong>privilege escalation<\/strong>) vulnerability enables attacks that would normally only be possible by someone with administrator or root permissions. Such vulnerabilities can make it possible to pull off attacks that may not be possible under normal conditions, or they can enable attacks to do more damage.<\/p>\n<p>This kernel bug does not merely affect iOS and iPadOS. <strong>The same kernel bug was also patched in tvOS 14.4 and watchOS 7.3<\/strong>, both of which were released simultaneously with the iOS and iPadOS updates on Tuesday.<\/p>\n<h3>Where are the macOS updates?<\/h3>\n<p><img loading=\"lazy\" class=\"alignright size-full wp-image-92954\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/01\/Finder-icon-macOS-Big-Sur-sad-face.png\" alt=\"Finder icon macOS Big Sur with sad face\" width=\"128\" height=\"128\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/01\/Finder-icon-macOS-Big-Sur-sad-face.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/01\/Finder-icon-macOS-Big-Sur-sad-face-300x300.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/01\/Finder-icon-macOS-Big-Sur-sad-face-150x150.png 150w\" sizes=\"(max-width: 128px) 100vw, 128px\" \/>Interestingly, Apple has yet to release corresponding macOS updates for Big Sur (macOS 11) or the two previous Mac operating systems, macOS Catalina (10.15) and macOS Mojave (10.14).<\/p>\n<p>Apple usually releases macOS updates simultaneously iOS and other operating system updates. Occasionally, however, the urgency of an in-the-wild exploit warrants releasing some patches before all of them are ready to be released.<\/p>\n<p>That seems to be the case here. On Monday, Apple released the second release candidate for macOS 11.2, so presumably the macOS updates will arrive soon.<\/p>\n<p><strong>Update:<\/strong> Apple deployed a third release candidate for macOS 11.2 on Thursday, January 28, and had not released the final version to the public by Friday. This seems to indicate that we may not see the next macOS release until around next Tuesday, February 2, or perhaps later.<\/p>\n<h3>Other bugs patched, but not yet announced<\/h3>\n<p>At the bottom of each page listing the <a href=\"https:\/\/support.apple.com\/en-us\/HT212146\" target=\"_blank\" rel=\"noopener\">iOS 14.4\/iPadOS 14.4<\/a>, <a href=\"https:\/\/support.apple.com\/en-us\/HT212149\" target=\"_blank\" rel=\"noopener\">tvOS 14.4<\/a>, and <a href=\"https:\/\/support.apple.com\/en-us\/HT212148\" target=\"_blank\" rel=\"noopener\">watchOS 7.3<\/a> security update details, Apple noted in italics, &#8220;<em><strong>Additional details available soon.<\/strong><\/em>&#8221;<\/p>\n<p>When Apple releases operating system security updates out of sync with one another, the company often holds back some details until the remaining operating systems have been patched. This may especially be true if disclosing some details could lead attackers to guess at how to exploit the OS for which patches are not yet available.<\/p>\n<p>There&#8217;s a good chance that Apple will release macOS Big Sur 11.2\u2014and presumably security-only updates for Catalina and Mojave\u2014sometime next week, so keep an eye out for those updates.<\/p>\n<p>We&#8217;ll cover any macOS-specific security bugs, as well as any of the security bugs in this week&#8217;s OS releases that Apple hasn&#8217;t yet told us about, right here on The Mac Security Blog.<\/p>\n<h3><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\">How can I learn more?<\/span><\/h3>\n<p><a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-71818\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-150x150.png\" alt=\"\" width=\"50\" height=\"50\" data-wp-editing=\"1\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-128x128.png 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png 300w\" sizes=\"(max-width: 50px) 100vw, 50px\" \/><\/a>On this week&#8217;s episode of the <strong>Intego Mac Podcast<\/strong>, Intego&#8217;s experts discuss these new vulnerabilities and a lot more. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener noreferrer\">subscribe<\/a> to make sure you never miss the latest episode!<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/player.fireside.fm\/v2\/GegHgcrH+oIIA2PWY?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>Also subscribe to our <strong>e-mail newsletter<\/strong> and keep an eye here on <strong>The Mac Security Blog<\/strong> for updates.<\/p>\n<p>And make sure you&#8217;re following Intego on your favorite social and media channels: <a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>, <a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener noreferrer\">Instagram<\/a>, <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>, and <a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener noreferrer\">YouTube<\/a> (click the \ud83d\udd14 to get notified about new videos).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple patched three actively exploited zero-day vulnerabilities in iOS and iPadOS on Tuesday, January 26. Update now to protect your iPhone and iPad! And prepare for macOS updates that should be coming soon.<\/p>\n","protected":false},"author":14,"featured_media":85426,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13,5],"tags":[201],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Apple patched three actively exploited zero-day vulnerabilities in iOS and iPadOS on Tuesday, January 26. Update now to protect your iPhone and iPad! And prepare for macOS updates that should be coming soon.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-actively-exploited-security-flaws-in-ios-ipados\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple patches actively exploited security flaws in iOS, iPadOS - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Apple patched three actively exploited zero-day vulnerabilities in iOS and iPadOS on Tuesday, January 26. Update now to protect your iPhone and iPad! And prepare for macOS updates that should be coming soon.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-actively-exploited-security-flaws-in-ios-ipados\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-27T04:17:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-29T21:59:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/ios-software-update-available-icon-400x260.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-actively-exploited-security-flaws-in-ios-ipados\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/ios-software-update-available-icon-400x260.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/ios-software-update-available-icon-400x260.png\",\"width\":400,\"height\":260,\"caption\":\"iOS software update available icon\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-actively-exploited-security-flaws-in-ios-ipados\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-actively-exploited-security-flaws-in-ios-ipados\/\",\"name\":\"Apple patches actively exploited security flaws in iOS, iPadOS - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-actively-exploited-security-flaws-in-ios-ipados\/#primaryimage\"},\"datePublished\":\"2021-01-27T04:17:49+00:00\",\"dateModified\":\"2021-01-29T21:59:09+00:00\",\"description\":\"Apple patched three actively exploited zero-day vulnerabilities in iOS and iPadOS on Tuesday, January 26. Update now to protect your iPhone and iPad! And prepare for macOS updates that should be coming soon.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-actively-exploited-security-flaws-in-ios-ipados\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-actively-exploited-security-flaws-in-ios-ipados\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-actively-exploited-security-flaws-in-ios-ipados\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple patches actively exploited security flaws in iOS, iPadOS\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-actively-exploited-security-flaws-in-ios-ipados\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-actively-exploited-security-flaws-in-ios-ipados\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Apple patches actively exploited security flaws in iOS, iPadOS\",\"datePublished\":\"2021-01-27T04:17:49+00:00\",\"dateModified\":\"2021-01-29T21:59:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-actively-exploited-security-flaws-in-ios-ipados\/#webpage\"},\"wordCount\":748,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-actively-exploited-security-flaws-in-ios-ipados\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/ios-software-update-available-icon-400x260.png\",\"keywords\":[\"Security Updates\"],\"articleSection\":[\"Security &amp; Privacy\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-actively-exploited-security-flaws-in-ios-ipados\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Apple patched three actively exploited zero-day vulnerabilities in iOS and iPadOS on Tuesday, January 26. Update now to protect your iPhone and iPad! And prepare for macOS updates that should be coming soon.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-actively-exploited-security-flaws-in-ios-ipados\/","og_locale":"en_US","og_type":"article","og_title":"Apple patches actively exploited security flaws in iOS, iPadOS - The Mac Security Blog","og_description":"Apple patched three actively exploited zero-day vulnerabilities in iOS and iPadOS on Tuesday, January 26. Update now to protect your iPhone and iPad! And prepare for macOS updates that should be coming soon.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-actively-exploited-security-flaws-in-ios-ipados\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2021-01-27T04:17:49+00:00","article_modified_time":"2021-01-29T21:59:09+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/ios-software-update-available-icon-400x260.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-actively-exploited-security-flaws-in-ios-ipados\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/ios-software-update-available-icon-400x260.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/ios-software-update-available-icon-400x260.png","width":400,"height":260,"caption":"iOS software update available icon"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-actively-exploited-security-flaws-in-ios-ipados\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-actively-exploited-security-flaws-in-ios-ipados\/","name":"Apple patches actively exploited security flaws in iOS, iPadOS - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-actively-exploited-security-flaws-in-ios-ipados\/#primaryimage"},"datePublished":"2021-01-27T04:17:49+00:00","dateModified":"2021-01-29T21:59:09+00:00","description":"Apple patched three actively exploited zero-day vulnerabilities in iOS and iPadOS on Tuesday, January 26. Update now to protect your iPhone and iPad! And prepare for macOS updates that should be coming soon.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-actively-exploited-security-flaws-in-ios-ipados\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-patches-actively-exploited-security-flaws-in-ios-ipados\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-actively-exploited-security-flaws-in-ios-ipados\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Apple patches actively exploited security flaws in iOS, iPadOS"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-actively-exploited-security-flaws-in-ios-ipados\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-actively-exploited-security-flaws-in-ios-ipados\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Apple patches actively exploited security flaws in iOS, iPadOS","datePublished":"2021-01-27T04:17:49+00:00","dateModified":"2021-01-29T21:59:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-actively-exploited-security-flaws-in-ios-ipados\/#webpage"},"wordCount":748,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-actively-exploited-security-flaws-in-ios-ipados\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/ios-software-update-available-icon-400x260.png","keywords":["Security Updates"],"articleSection":["Security &amp; Privacy","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-patches-actively-exploited-security-flaws-in-ios-ipados\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/ios-software-update-available-icon-400x260.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-ob5","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/92943"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=92943"}],"version-history":[{"count":14,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/92943\/revisions"}],"predecessor-version":[{"id":92960,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/92943\/revisions\/92960"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/85426"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=92943"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=92943"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=92943"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}