Google Chrome, Apple iTunes users, Indian Govt has a warning for you: Full details 

CERT explained that these vulnerabilities could allow hackers to remotely access your Apple device

A vulnerability has been reported in Apple iTunes which could be exploited by a remote attacker to execute arbitrary code
A vulnerability has been reported in Apple iTunes which could be exploited by a remote attacker to execute arbitrary code

The Computer Emergency Response Team (CERT) under the Indian government issued a warning about vulnerabilities in iTunes and Google Chrome desktop applications. 

Reportedly, CERT explained that these vulnerabilities could allow hackers to remotely access your Apple device and execute arbitrary code.

What should you be aware of ?

CERT mentioned that the vulnerability in Apple iTune exists due to improper checks in a component called ‘CoreMedia’. This ‘CoreMedia’ could be exploited by hackers by sending a specially crafted request. Next this vulnerability might affect your Apple iTunes on Windows prior to version 12.13.2.

Furthermore, “This vulnerability exists in Apple Product due to improper checks in CoreMedia component. A remote attacker could exploit this vulnerability by sending a specially crafted request. Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the targeted system,” CERT explained.

It is believed that Google Chrome has also reported vulnerabilities in its Visuals and ANGLE components, as well as in WebAudio due to use-after-free errors and heap buffer overflow, respectively. 

Safety you need to follow

Additionally, “A vulnerability has been reported in Apple iTunes which could be exploited by a remote attacker to execute arbitrary code on the targeted system,” the CERT-In advisory highlighted.

From what it is understood, there is a security vulnerability in Apple products, called ‘Remote Code Execution’, which is caused by insufficient checks in the CoreMedia component. Experts explained that the attacker could take advantage of this vulnerability by sending a specially crafted request. Then you click on the request and land up in something such as ‘secret tracking,’ of your phone. 

To avoid this you need to beware of such links. Experts suggest that you avoid clicking on any links that look ‘phisy’ or ‘suspicious.’ Furthermore, you can avoid such threats by keeping your Apple devices and iTunes updated. This has to be on a regular basis.

Follow FE Tech Bytes on TwitterInstagramLinkedInFacebook

Read Next
This article was first uploaded on May twelve, twenty twenty-four, at forty-nine minutes past five in the evening.

/

X