Why It’s Important To Update To iOS 10.1 As Soon As Possible
What is it and how it works?
Apple has clearly identified – through an external source – an issue whereby pre-iOS 10.1 devices are subject to manipulation via a targeted JPEG that contains embedded malicious code designed to execute when it makes itself at home on the host device. It would appear that any infected image could act as a backdoor of sorts to the device itself, with the chance that any would-be attackers responsible for the code, then being able to access information and extract it from the iPhone or iPad.
Apple addresses this as part of the information noting that “viewing a maliciously crafted JPEG file may lead to arbitrary code execution” on the device.
What’s the fix?
The vulnerability is patched with an immediate spare to iOS 10.1.
Apple Security update page notes following:
-Available for: iPhone 5 and later, iPad 4th generation and later, iPod touch 6th
generation and later.
-Impact: Viewing a maliciously crafted JPEG file may lead to arbitrary code execution
-Description: A memory corruption issue was addressed through improved memory handling.
-CVE-2016-4673: Marco Grassi (@marcograss) of KeenLab (@keen_lab), Tencent
The JPEG image fix is just one security update of many in iOS 10.1, with Apple also including patches to prevent “an attacker in a privileged network position” from being able to continue receiving audio after a FaceTime call has been terminated. Check out the full Apple security document outlining all of the iOS 10.1 security patches for more information.
What you need to do?
iPhone 5 and later, iPad 4th generation and later, iPod touch 6th generation and later