--- licence_title: Creative Commons Attribution 4.0 International (CC-BY 4.0) licence_link: https://creativecommons.org/licenses/by/4.0/ licence_restrictions: https://cert.europa.eu/legal-notice licence_author: CERT-EU, The Cybersecurity Service for the European Union institutions, bodies, offices and agencies title: 'Zero-Click Vulnerabilities in Apple Operating Systems' version: '1.0' number: '2023-061' original_date: 'September 7, 2023' date: 'September 8, 2023' --- _History:_ * _08/09/2023 --- v1.0 -- Initial publication_ # Summary In an article published on September 7 2023, _Citizen Lab_ uncovered an actively exploited zero-click vulnerability used to deliver NSO Group's **Pegasus** spyware on an employee of a Washington DC based civil society organisation [1]. This exploit, named `BLASTPASS` could compromise iPhones running the latest iOS version without user interaction. The exploit involved `PassKit` attachments containing malicious images sent from an attacker iMessage account to the victim. _Citizen Lab_ promptly reported their findings to Apple, who issued two CVEs related to this exploit chain (CVE-2023-41064 and CVE-2023-41061). These vulnerabilities have now been patched in iOS, iPadOS, watchOS and macOS. # Technical Details ## CVE-2023-41064 A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.5.2, iOS 16.6.1 and iPadOS 16.6.1. Processing a maliciously crafted image may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited [2]. ## CVE-2023-41061 A validation issue was addressed with improved logic. This issue is fixed in watchOS 9.6.2, iOS 16.6.1 and iPadOS 16.6.1. A maliciously crafted attachment may result in arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited [3]. # Affected Products MacOS Ventura, watchOS, iOS and iPadOS devices. # Recommendations CERT-EU strongly recommends to update Apple devices. Users who may face increased risk because of who they are or what they do could enable `Lockdown Mode` [4]. # References [1] [2] [3] [4]