India’s CERT-In Issues High-Level Security Warning for Vulnerabilities in Apple Devices: Update Now to Stay Protected

India's CERT-In Issues High-Level Security Warning for Vulnerabilities in Apple Devices: Update Now to Stay Protected

India’s Computer Emergency Response Team (CERT-In) has issued a high-level warning regarding security vulnerabilities in various Apple products. This advisory impacts iPhones, iPads, Mac devices, Apple Watches, and other Apple products that are running outdated software versions. CERT-In warns that older versions of these operating systems are vulnerable to potential cyberattacks.

Affected Apple Products:

iPhones: iOS versions earlier than iOS 18 and iOS 17.7

iPads: iPadOS versions before iPadOS 18 and iPadOS 17.7

Macs: Devices running macOS versions prior to macOS 15 (Sequoia), macOS 14.7 (Sonoma), and macOS 13.7 (Ventura)

Apple Watches: watchOS versions earlier than watchOS 11

Apple TV: tvOS versions prior to version 18

Safari: Versions before 18

Xcode: Versions before 16

Apple Vision: visionOS versions prior to version 2

Potential Security Threats:

CERT-In’s advisory highlights multiple vulnerabilities that could allow attackers to execute arbitrary code, bypass security restrictions, and cause memory corruption on affected devices. These security risks can leave users vulnerable to data theft, remote attacks, and privacy breaches.

Steps to Secure Devices:

Users are advised to update their Apple devices to the latest software versions immediately. Apple regularly releases security patches and updates to address these vulnerabilities, and keeping devices up-to-date is crucial to avoid potential security threats.

For iPhone and iPad users, upgrading to iOS 18 and iPadOS 18, or at least version 17.7, can significantly reduce the risk of exploitation. Mac users should upgrade to macOS Sequoia (15), Sonoma (14.7), or Ventura (13.7), while Apple Watch users should ensure they are on watchOS 11.

By keeping devices updated and using secure browsing practices, Apple users can mitigate the risks associated with these vulnerabilities.

Leave a Reply

Your email address will not be published. Required fields are marked *