Apple Products Multiple Vulnerabilities

Apple Products Multiple Vulnerabilities

Multiple vulnerabilities were identified in Apple Products. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, elevation of privilege, spoofing, remote code execution, sensitive information disclosure, data manipulation and security restriction bypass on the targeted system.




Denial of Service
Elevation of Privilege
Remote Code Execution
Information Disclosure
Data Manipulation
Security Restriction Bypass

System / Technologies affected

Versions prior to iOS 15.7.1 and iPadOS 15.7.1


Before installation of the software, please visit the vendor web-site for more details.


Apply fixes issued by the vendor:

iOS 15.7.1 and iPadOS 15.7.1

Read More