May 18, 2017 By Shane Schick 2 min read

Two months after security researchers uncovered five major vulnerabilities in Apple products at the Pwn2Own contest, the technology giant released patches to address more than 100 bugs across MacOS, Safari and other affected products.

According to SecurityWeek, the Apple patch update released on May 17 addressed 37 vulnerabilities, four of which were uncovered by Pwn2Own contestants. These discoveries included vulnerabilities that could have allowed cybercriminals to break into a computer running Mac OS Sierra 10.12.5. Once inside, attackers could potentially visit websites, execute code, steal credentials and more.

The patches fixed scores of other bugs as well, including some specific to Safari 10.1.1.

Bobbing for Bad Apples

This year’s Pwn2Own, a hacking contest that takes place every year at the CanSecWest security conference in Vancouver, awarded cash prizes for discovering security issues on major platforms. As MacRumors reported at the time, contestants were able to interfere with the touch bar on a Mac and scroll through messages by exploiting a vulnerability Apple’s Safari browser. Apple was notified of the discovery immediately following the contest.

The Pwn2Own contest is run as part of the Zero Day Initiative, which advised Apple users to apply the patches quickly to help avoid security attacks such as the WannaCry outbreak that recently made international headlines. In total, the contest identified 35 percent of the vulnerabilities Apple patched, according to the Zero Day Initiative.

Inside the Apple Patch Update

A more recent bug addressed through Apple’s security update, identified by a researcher at Synack, could have been considered a zero-day issue, Threatpost reported. If a computer had file access auditing turned on, cybercriminals could have used an info kernel leak to read restricted memory.

As extensive as the patches appear, though, Apple actually addressed 233 vulnerabilities across MacOS, Safari and iOS in its previous update.

Of course, Apple is also covering bugs that didn’t come up at Pwn2Own. Infosecurity Magazine noted that patches are available for potential problems with iOS 10.3.2, including sandbox escapes related to the kernel, numerous WebKit vulnerabilities in watchOS and tvOS, and more.

Although Apple hasn’t disclosed whether any of these bugs are being exploited in the wild, it’s probably best to make sure the patches are deployed as quickly as possible.

More from

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

4 trends in software supply chain security

4 min read - Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised.Expect to see more software supply chain attacks moving forward. According to ReversingLabs' The State of Software Supply Chain Security 2024 study, attacks against the software…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today