Computer Emergency Response Team India (CERT-IN) recently issued a warning for some versions of macOSthe operating system that powers Apple Mac laptops and desktops.
The government body rated the security risk as “high severity” and mentioned that several vulnerabilities have been discovered in macOS operating systems, which could make Mac users an easy target for hackers.
For those who are not, CERT-IN is a nodal agency under the Ministry of Electronics and Information Technology. The government body is responsible for highlighting bugs and cybersecurity threats like phishing and hacking.
What the government said
CERT-IN noted that “These vulnerabilities exist in Apple macOS due to out-of-bounds reading in AppleScript, SMB, and Kernel; out of bounds write in audio, intensive care, PS Normalizer, GPU, SMB and Webkit drivers; permission issue in AppleMobileFileIntegrity: information disclosure in Calendar and iCloud Photo Library: logic issue in File System Events, Pluginkit, Windows Server and Automation; memory corruption in Intel graphics driver, GPU, SMB and WebRTC drivers; type confusion in multi-touch; memory initialization in libxml2.
The message further adds that “a remote attacker could exploit these vulnerabilities by tricking a victim into visiting maliciously crafted web content.”
The government body rated the security risk as “high severity” and mentioned that several vulnerabilities have been discovered in macOS operating systems, which could make Mac users an easy target for hackers.
For those who are not, CERT-IN is a nodal agency under the Ministry of Electronics and Information Technology. The government body is responsible for highlighting bugs and cybersecurity threats like phishing and hacking.
What the government said
CERT-IN noted that “These vulnerabilities exist in Apple macOS due to out-of-bounds reading in AppleScript, SMB, and Kernel; out of bounds write in audio, intensive care, PS Normalizer, GPU, SMB and Webkit drivers; permission issue in AppleMobileFileIntegrity: information disclosure in Calendar and iCloud Photo Library: logic issue in File System Events, Pluginkit, Windows Server and Automation; memory corruption in Intel graphics driver, GPU, SMB and WebRTC drivers; type confusion in multi-touch; memory initialization in libxml2.
The message further adds that “a remote attacker could exploit these vulnerabilities by tricking a victim into visiting maliciously crafted web content.”
Who are all concerned
According to the official post, Mac devices running macOS Catalina prior to Security Update 2022-005, Apple macOS Big Sur versions prior to 11.6.8, and Apple macOS Monterey versions prior to 12.5 are affected by the current vulnerabilities.
What users can do
The government has advised users to install the latest macOS updates containing the fix for the vulnerabilities.