Apple has released security updates to address several security flaws, including two vulnerabilities (CVE-2024-23296 and CVE-2024-23225) that it said have been actively exploited in the wild.
CVE-2024-23296: RTKit Memory Corruption Vulnerability
Description: A memory corruption vulnerability has been unveiled in RTKit, Apple’s proprietary embedded/real-time operating system. This flaw allows an attacker with arbitrary read and write capabilities in the kernel to bypass kernel memory protections.
Impact: This vulnerability poses a significant threat, granting attackers the potential to execute malicious actions within the system.
Solution: As of now, an official solution has not been provided. Apple users are urged to stay vigilant and follow updates from the company for a prompt resolution.
CVE-2024-23225: iOS Kernel Memory Corruption Issue
Description: Another memory corruption challenge emerges in the iOS kernel. Similar to the previous CVE, it enables an attacker with arbitrary read and write capabilities in the kernel to circumvent memory protections.
Impact: The impact mirrors that of CVE-2024-23296, allowing potential malicious actions within the system.
Solution: Fortunately, Apple has addressed this vulnerability in the following updates: iOS 16.7.6, iPadOS 16.7.6, iOS 17.4, and iPadOS 17.4. Users are strongly advised to update their devices promptly to secure their systems against potential exploits.

Safeguarding Against CVEs (CVE-2024-23296 & CVE-2024-23225): A Comprehensive Guide
In the wake of recently uncovered vulnerabilities, fortify your device against potential threats with these proactive measures:
1. Keep Your Operating System Up-to-Date:
Ensure that your operating system is running the latest version. Regularly check for available updates and apply them promptly. These updates often contain crucial fixes for known vulnerabilities, enhancing your device’s security.
2. Enable Automatic Updates:
Configure your device to automatically download and install system updates. This ensures that your device remains shielded against the latest threats without requiring manual intervention.
3. Exercise Caution with Apps and Links:
Avoid downloading applications or files from untrustworthy sources. Steer clear of clicking on suspicious links or opening attachments from unfamiliar emails. Vigilance in app and link interactions is key to reducing potential risks.
4. Employ a Reliable Security Solution:
Install and maintain an updated security or antivirus application on your device. Regularly scan your device for potential threats, providing an additional layer of defense against malicious activities.
5. Establish Strong and Unique Passwords:
Enhance your security posture by utilizing robust and unique passwords for your accounts and devices. Refrain from password reuse, and consider implementing a password management solution for added convenience and security.
6. Activate Device Encryption:
Wherever possible, enable encryption on your device. This serves as a protective measure for your data in the event of loss or theft, ensuring that sensitive information remains secure.
7. Exercise Awareness of App Permissions:
Review the permissions granted to applications on your device. Avoid granting unnecessary access to features or data that are not essential for the application’s functionality. Restricting permissions minimizes potential vulnerabilities.
By diligently following these steps, you fortify your device against known vulnerabilities, ensuring a resilient defense against emerging threats. Stay proactive, stay secure.
Available updates for CVE-2024-23296 & CVE-2024-23225
The updates are available for the following devices :
- iOS 16.7.6 and iPadOS 16.7.6 – iPhone 8, iPhone 8 Plus, iPhone X, iPad 5th generation, iPad Pro 9.7-inch, and iPad Pro 12.9-inch 1st generation
- iOS 17.4 and iPadOS 17.4 – iPhone XS and later, iPad Pro 12.9-inch 2nd generation and later, iPad Pro 10.5-inch, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 6th generation and later, and iPad mini 5th generation and later