Skip to content

Commit

Permalink
Apple Releases Urgent Updates - 20241120001 (#1103)
Browse files Browse the repository at this point in the history
* SolarWinds Releases Patches for Access Rights Manager vulnerabilities - 20240219001

* Format markdown files

* Format markdown files

* Junos OS RCE Vulnerability - 20240226002

* Format markdown files

* Windows Themes Spoofing Vulnerability - 20240308003

* Format markdown files

* Windows Themes Spoofing Vulnerability - 20240308003 - edited

* Akamai Kubernetes Vulnerability - 20240318002

* Format markdown files

* CISA Releases Multiple Critical Infrastructure Related Advisories - 20240327001

* Format markdown files

* PGAdmin Remote Code Execution Vulnerability - 20240408001

* Format markdown files

* Update 20240408001-PGAdmin-Remote-Code-Execution-Vulnerability.md

FIxing tables

* Format markdown files

* Palo Alto Networks PAN-OS Command Injection Vulnerability added to CISA Known Exploited Catalog - 20240415001

* Format markdown files

* Palo Alto Networks PAN-OS Command Injection Vulnerability added to CISA Known Exploited Catalog - 20240415001

* Format markdown files

* Update 20240415001-PaloAlto-Networks-PAN-OS-Command-Injection-Vulnerability-added-to-CISA-Known-Exploited-Catalog.md

Added older versions updates and Zero day notes

* Format markdown files

* Google Chrome Multiple RCE Vulnerabilities - 20240418002

* Format markdown docs

* Remove duplicate 20240415001-PaloAlto

* Update 20240418002-Google-Chrome-Multiple-RCE-Vulnerabilities.md

Reviewed and Approved

* Format markdown docs

* Libreswan Popular VPN Software Vulnerability - 20240419004

* Format markdown docs

* Update 20240419004-Libreswan-Popular-VPN-Software-Vulnerability.md

Fix table

* Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability - 20240422002

* Format markdown docs

* Update 20240422002-Microsoft-Edge-Chromium-based-Security-Feature-Bypass-Vulnerability.md

fix tables

* Windows Kernel Elevation of Privilege Vulnerability - 20240429001

* Format markdown docs

* Update 20240429001-Windows-Kernel-Elevation-of-Privilege-Vulnerability.md

fixing table

* Acrobat Reader Vulnerability - 20240503003

* Format markdown docs

* Google Chrome Arbitrary Code Execution Multiple Vulnerabilities - 20240509001

* Format markdown docs

* Update 20240509001-Google-Chrome-Arbitrary-Code-Execution-Multiple-Vulnerabilities.md

Fix table

* Microsoft Edge (Chromium-based) Spoofing Vulnerability - 20240513003

* Format markdown docs

* Update 20240513003-Microsoft-Edge-Chromium-based-Spoofing-Vulnerability.md

Fix table

* Cacti Command Injection and XSS Vulnerabilities - 20240516004

* Format markdown docs

* Ivanti EPMM Vulnerability - 20240523002

* Format markdown docs

* Ivanti EPMM Vulnerability - 20240523002

* Ivanti EPMM Vulnerability - 20240523002

* Ivanti Endpoint Manager GetRulesetsSQL SQL Injection RCE Vulnerability - 20240527003

* Format markdown docs

* Update 20240527003-Ivanti-Endpoint-Manager-GetRulesetsSQL-SQL-Injection-RCE-Vulnerability.md

Reduce size of title

* WordPress Plugin Vulnerabilities - 20240626003

* Format markdown docs

* GeoServer Urgent Advisory - 20240704002

* Format markdown docs

* Ivanti Releases New Security Advisories - 20240718004

* Format markdown docs

* Apple Releases Multiple Product Updates - 20240731004

* Format markdown docs

* Update 20240731004

* Format markdown docs

* Azure Managed Instance for Apache Cassandra Elevation of Privilege Vulnerability - 20240822002

* Format markdown docs

* Update 20240822002

Renamed page to reduce character count.
Updated observations to include vendor knowledge of exploitation.
Updated recommendation to "48 hours" in alignment with E8 ML1 Patch Management.

* Cisco Publishes Critical Update - 20240906003

* Format markdown docs

* Cisco Publishes Critical Update - 20240906003

* Format markdown docs

* Update 20240906003

Reformatted table to condense same product and versions to a single line with CVEs line separated.

* Format markdown docs

* SolarWinds Critical Update - 20240913001

* Format markdown docs

* SolarWinds Critical Update - 20240913001

* CISA Releases OT and ICS Advisory - 20240926002

* Format markdown docs

* Update 20240926002

Removed hyperlinked secondary article as it is referenced in the CISA Advisory page.

* SAP Critical Vulnerability - 20241009003

* Format markdown docs

* Update 20241009003

Corrected hyperlink syntax

* Format markdown docs

* Oracle Publishes Quarterly Critical Patch Advisory - 20241018001

* IBM Critical Update - 20241031002

* Format markdown docs

* Delete duplicate file

Removing accidentally duplicated file.

* Update 20241031002

Updated vendor hyperlink with correct syntax.

* Format markdown docs

* Apple Releases Urgent Updates - 20241120001

* Format markdown docs

* Update 20241120001

Updated vulnerability table to reduce information

* Format markdown docs

* Update 20241120001

Updated Observed with apple detection awareness

---------

Co-authored-by: GitHub Actions <[email protected]>
Co-authored-by: Joshua Hitchen (DGov) <[email protected]>
Co-authored-by: LSerki <[email protected]>
Co-authored-by: DGovEnterprise <[email protected]>
Co-authored-by: JadonWill <[email protected]>
Co-authored-by: JadonWill <[email protected]>
  • Loading branch information
7 people authored Nov 20, 2024
1 parent a757c6a commit 9c6fb19
Showing 1 changed file with 21 additions and 0 deletions.
21 changes: 21 additions & 0 deletions docs/advisories/20241120001-Apple-Releases-Urgent-Updates.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,21 @@
# Apple Releases Urgent Updates - 20241120001

## Overview

Apple released emergency security updates to fix two zero-day vulnerabilities that were exploited in attacks on Intel-based Mac systems.

## What is vulnerable?

| Product(s) and Version(s) Affected | CVE | CVSS | Severity |
| ------------------------------------------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------- | ------------ | ------------ |
| MacOS Sequoia < 15.1.1 <br> Safari < 18.1.1 <br> iOS 18 < 18.1.1 <br> iOS 17 < 17.7.2 <br> iPadOS 18 < 18.1.1 <br> iPadOS 17 < 17.7.2 | [CVE-2024-44308](https://nvd.nist.gov/vuln/detail/CVE-2024-44308) <br> [CVE-2024-44309](https://nvd.nist.gov/vuln/detail/CVE-2024-44309) | TBD <br> TBD | TBD <br> TBD |

## What has been observed?

Apple is aware of active exploitation of the mentioned vulnerabilities. There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.

## Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of *48 hours...* (refer [Patch Management](../guidelines/patch-management.md)):

- Apple Security Release Notes: <https://support.apple.com/en-us/100100>

0 comments on commit 9c6fb19

Please sign in to comment.