Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Apple Enhances Security for Older iOS Devices Against Exploits

Apple Enhances Security for Older iOS Devices Against Exploits

Posted on March 12, 2026 By CWS

Apple has expanded its security measures to include older iOS, iPadOS, and macOS Sonoma versions, addressing a critical vulnerability exploited by the Coruna exploit kit. This move aims to protect devices unable to upgrade to the latest operating systems, ensuring continued security for a broader range of users.

Details of the Security Flaw

The identified flaw, CVE-2023-43010, is a WebKit vulnerability that could lead to memory corruption through malicious web content. Apple has improved the handling of this issue, initially fixed in iOS 17.2, and now backported to older versions to mitigate potential exploits.

These updates are essential for older devices, including iPhone 6s, iPhone 7, and several iPad models, providing them with the necessary protection against this security threat.

Additional Vulnerability Fixes

In addition to CVE-2023-43010, Apple addressed three more vulnerabilities related to the Coruna exploit. These include CVE-2023-43000, a WebKit issue originally fixed in July 2023, and CVE-2023-41974, a kernel vulnerability addressed in September 2023. Furthermore, CVE-2024-23222, resolved in January 2024, was also patched in this update.

The comprehensive approach ensures that older devices are safeguarded against multiple potential threats, maintaining the integrity of Apple’s ecosystem.

Broader Implications of the Coruna Exploit

The Coruna exploit kit, with its complex chain of 23 exploits, targets iPhone models running iOS versions from 13.0 to 17.2.1. Reports have linked its development to L3Harris, a U.S. military contractor, and subsequent dealings with Russian operatives, highlighting the exploit’s sophistication and international implications.

Notably, the kit includes two zero-day exploits, CVE-2023-32434 and CVE-2023-38606, used in a 2023 campaign against Russian users. While research by Google and iVerify indicates shared vulnerabilities with Operation Triangulation, there is no direct evidence of code reuse, underscoring the challenge of attribution in cybersecurity.

In conclusion, Apple’s proactive updates for older devices demonstrate its commitment to user security, reinforcing its defenses against evolving threats. As the cybersecurity landscape continues to evolve, such measures are vital to safeguard consumer data and device functionality.

The Hacker News Tags:Apple, Coruna exploit, CVE-2023-43010, device updates, iOS security, iPadOS, iPhone, macOS, Malware, WebKit vulnerability

Post navigation

Previous Post: Hackers Exploit Cloudflare to Target Microsoft 365 Users
Next Post: Cisco Addresses Critical IOS XR Security Flaws

Related Posts

Microsoft Discloses Exchange Server Flaw Enabling Silent Cloud Access in Hybrid Setups Microsoft Discloses Exchange Server Flaw Enabling Silent Cloud Access in Hybrid Setups The Hacker News
Enhancing Mobile Security with Samsung Knox Enhancing Mobile Security with Samsung Knox The Hacker News
ScarCruft Exploits Zoho WorkDrive for Air-Gapped Network Breach ScarCruft Exploits Zoho WorkDrive for Air-Gapped Network Breach The Hacker News
How Passwork 7 Addresses Complexity of Enterprise Security How Passwork 7 Addresses Complexity of Enterprise Security The Hacker News
Rootkit Patch, Federal Breach, OnePlus SMS Leak, TikTok Scandal & More Rootkit Patch, Federal Breach, OnePlus SMS Leak, TikTok Scandal & More The Hacker News
Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Severe N8n Vulnerabilities Risked Server Control
  • Critical Cisco IOS XR Vulnerabilities Demand Immediate Attention
  • Cisco Addresses Critical IOS XR Security Flaws
  • Apple Enhances Security for Older iOS Devices Against Exploits
  • Hackers Exploit Cloudflare to Target Microsoft 365 Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Severe N8n Vulnerabilities Risked Server Control
  • Critical Cisco IOS XR Vulnerabilities Demand Immediate Attention
  • Cisco Addresses Critical IOS XR Security Flaws
  • Apple Enhances Security for Older iOS Devices Against Exploits
  • Hackers Exploit Cloudflare to Target Microsoft 365 Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News