Multiple vulnerabilities have been reported in Apple products which could allow an attacker to access sensitive information, execute arbitrary code, bypass security restrictions, cause denial of service (DoS) conditions, bypass authentication, gain elevated privileges, data manipulation and perform spoofing attacks on the targeted system.
Target Audience:
Individuals and organizational users of macOS, iOS and iPadOS devices.
Risk Assessment:
High risk of unauthorized access, data theft or gain control of affected system.
Impact Assessment:
Potential for unauthorized access to sensitive user information, denial of service and data manipulation.
The information provided herein is on "as is" basis, without warranty of any kind.