Apple issues emergency fixes for Coruna flaws in older iOS versions
嗯,用户让我帮忙总结一下这篇文章的内容,控制在100个字以内。首先,我需要通读整篇文章,抓住主要信息。 文章主要讲的是苹果公司发布了紧急更新,修复了与Coruna漏洞相关的安全问题。这些更新适用于旧款的iOS设备,比如iPhone和iPad。Coruna是一个强大的iOS漏洞套件,可以影响从iOS 13.0到17.2.1的版本。Google的威胁情报团队发现了这个套件,并指出它被用于针对乌克兰的网络钓鱼活动以及中国的金融威胁行为。 苹果公司发布了iOS 16.7.15和15.8.7的更新,修复了多个CVE漏洞,包括CVE-2023-43000和CVE-2023-43010等。这些更新主要是为了保护那些无法升级到最新iOS版本的旧设备。 用户的要求是用中文总结,不超过100字,并且不需要特定的开头。所以我要确保内容简洁明了,涵盖苹果发布更新、修复Coruna漏洞、影响范围以及相关背景信息。 可能需要注意的是,不要遗漏关键点:苹果发布更新、针对旧设备、修复Coruna漏洞、影响版本范围、Google发现的情况等。 最后,检查一下字数是否符合要求,并确保语言流畅自然。 </think> Apple发布iOS 16.7.15和15.8.7更新,修复与Coruna漏洞相关的安全问题。该漏洞套件可影响iOS 13.0至17.2.1版本设备,被用于针对乌克兰的网络钓鱼活动及中国金融威胁行为。 2026-3-12 15:28:41 Author: securityaffairs.com(查看原文) 阅读量:2 收藏

Apple issues emergency fixes for Coruna flaws in older iOS versions

Apple released iOS 16.7.15 and 15.8.7 updates for older iPhones and iPads to patch vulnerabilities linked to the Coruna exploits.

Apple has released security updates for legacy devices, rolling out iOS and iPadOS 16.7.15 and 15.8.7 to address vulnerabilities tied to the recently disclosed Coruna exploits. The patches aim to protect older iPhone and iPad models that no longer receive the latest major OS versions.

In early March, Google’s Threat Intelligence Group identified a powerful new iOS exploit kit called Coruna (also known as CryptoWaters) that targets Apple iPhones running iOS versions 13.0 through 17.2.1. The kit includes five full exploit chains and a total of 23 exploits.

CodenameCVEType
buffoutCVE-2021-30952WebContent R/W
jacurutuCVE-2022-48503WebContent R/W
bluebirdNo CVEWebContent R/W
terrorbirdCVE-2023-43000WebContent R/W
cassowaryCVE-2024-23222WebContent R/W
breezyNo CVEWebContent PAC bypass
breezy15No CVEWebContent PAC bypass
seedbellNo CVEWebContent PAC bypass
seedbell_16_6No CVEWebContent PAC bypass
seedbell_17No CVEWebContent PAC bypass
IronLoaderCVE-2023-32409WebContent sandbox escape
NeuronLoaderNo CVEWebContent sandbox escape
NeutronCVE-2020-27932PE
DynamoCVE-2020-27950PE (infoleak)
PendulumNo CVEPE
PhotonCVE-2023-32434PE
ParallaxCVE-2023-41974PE
GruberNo CVEPE
QuarkNo CVEPPL Bypass
GalliumCVE-2023-38606PPL Bypass
CarboneNo CVEPPL Bypass
SparrowCVE-2024-23225PPL Bypass
RocketCVE-2024-23296PPL Bypass

While highly capable against iPhones running iOS 13.0 through 17.2.1versions, Coruna is ineffective against the latest iOS release, according to Google.

GTIG tracked the use of the exploit in highly targeted attacks by a surveillance vendor’s customer, in Ukrainian watering hole campaigns by UNC6353, and later in broad-scale attacks by Chinese financial threat actor UNC6691, showing an active market for “second-hand” zero-day exploits. Multiple threat actors now reuse and adapt these advanced techniques for new vulnerabilities.

Initial discovery occurred in February 2025 when GTIG captured a previously unseen JavaScript framework delivering an iOS exploit chain from a surveillance vendor’s customer.

The Coruna exploit kit relies on a highly engineered framework that links all components through shared utilities and custom loaders. It avoids devices in Lockdown Mode or private browsing, derives resource URLs from a hard-coded cookie, and delivers WebKit RCE and PAC bypasses in clear form. After exploitation, a binary loader deploys encrypted, compressed payloads disguised as .min.js files, tailored to specific chips and iOS versions. In total, the kit includes 23 exploits covering iOS 13 through 17.2.1, with advanced mitigation bypasses and reusable modules for defeating memory and kernel protections.

At the end of the chain, a stager called PlasmaLoader injects into a root daemon and deploys a financially focused payload.

The malware scans for crypto wallets, backup phrases, and banking data, exfiltrating sensitive information and loading additional modules from command-and-control servers. It targets numerous cryptocurrency apps, uses encrypted communications, and falls back on a custom domain generation algorithm seeded with “lazarus” to maintain persistence.

Apple released iOS and iPadOS 15.8.7 for older devices to patch vulnerabilities previously fixed in newer versions of iOS and iPadOS. Version 15.8.7 fixes CVE-2023-41974, CVE-2024-23222, CVE-2023-43000, and CVE-2023-43010.

“This fix associated with the Coruna exploit was shipped in iOS 17.3 on January 22, 2024. This update brings that fix to devices that cannot update to the latest iOS version.” reads the advisory published by Apple.

Meanwhile, version 16.7.15 patches the WebKit vulnerability CVE-2023-43010.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, Apple)




文章来源: https://securityaffairs.com/189362/security/apple-issues-emergency-fixes-for-coruna-flaws-in-older-ios-versions.html
如有侵权请联系:admin#unsafe.sh