What WebKit zero-day means for Apple users
A zero-day vulnerability has been found in various Apple products. This means a security bug existed with no patch available, leaving systems open to cyber-attacks. Use this guidance to learn more about the vulnerability, if you’re affected, and what you need to do.Â
About this vulnerabilityÂ
Cyber criminals can exploit this flaw to create a malicious website. Once this website is live and a potential victim visits it, the attacker will be able to run programs on the device.Â
In practice, this would mean your iPhone, iPad or Mac would be infected once you visit the site.Â
The vulnerability belongs to the Use-After-Free (UAF) class which makes the issue related to memory being used incorrectly in applications. Â
Who is affected?Â
If you use the following devices or applications, you may be impacted by this vulnerability:Â
- iPhone 6S and newer
- All models of iPad ProÂ
- iPad Air version 2 and newerÂ
- iPad starting with 5th generationÂ
- iPad mini starting with 4th generationÂ
- iPad touch media player starting with 7th generation
- SafariÂ
- macOS MontereyÂ
This list is also available on Apple’s security updates page.Â
What you need to doÂ
Apple has released a security patch to address this vulnerability. We have alerted those in an IT support role at the University who may have already been in touch.Â
If you own any of the devices or use any of the applications listed above, update them as soon as possible.Â
If your device was bought through your school, please discuss this with your Computing Officer. Â
If you use a University-managed device, we will update it automatically and no action is needed.