Security researchers have warned that attackers with physical access to a locked device could exploit this bug to reactivate the data port, potentially allowing deeper intrusion. Apple has confirmed that the vulnerability has been used in an “extremely sophisticated” attack against specific high-profile individuals.
The National Institute of Standards and Technology (NIST) classified this flaw as an “authorization issue”, which Apple has resolved by improving state management. The company has rolled out patches in iOS 18.3.1, iPadOS 18.3.1, and iPadOS 17.7.5, covering a wide range of models, including iPhone XS and later, iPad Pro, iPad Air, iPad Mini, and standard iPad models.
The vulnerability was first discovered by Bill Marczak, a senior researcher at Citizen Lab, a group known for uncovering highly advanced surveillance techniques. Although Apple has not disclosed specific details of the exploit, experts believe it may be linked to nation-state surveillance efforts.
Users are strongly advised to update their devices immediately to mitigate the risk of exploitation.
Source: HackRead
The European Cyber Intelligence Foundation is a nonprofit think tank specializing in intelligence and cybersecurity, offering consultancy services to government entities. To mitigate potential threats, it is important to implement additional cybersecurity measures with the help of a trusted partner like INFRA www.infrascan.net, or you can try yourself using check.website.