Affiliate Disclosure
If you buy through our links, we may get a commission. Read our ethics policy.

Exploit that delivered Pegasus spyware patched in iOS 16.6.1 update

Last updated

Apple's operating system updates on Thursday patched an exploit chain capable of compromising iOS 16.6 devices with the Pegasus spyware without any interaction from the victim.

The exploit was discovered on an iPhone owned by an individual employed by a Washington DC-based civil society organization. The exploit was used to deliver NSO Group's Pegasus mercenary spyware.

Toronto's Citizen Lab states that the exploit involves PassKit containing "malicious images sent from an attacker iMessage account to the victim."

Citizen Lab disclosed their findings to Apple, who promptly issued CVE-2023-41064 and CVE-2023-41061 related to the exploit chain. The iOS 16.6.1 patch fixes the security gap, and Thursday's report from Citizen Lab confirms that.

Both Citizen Lab and AppleInsider recommend that iPhone owners update their devices as soon as feasible. Users can download the security fix by opening the Settings app, tapping Software Update, and installing iOS 16.6.1 from the menu.

The security researchers will publish a more detailed discussion of the exploit chain in the future.



4 Comments

ralphie 5 Years · 129 comments

So much for the so-called “rapid security responses”.  Why didn’t apple issue that?!  

bhessel 1 Year · 1 comment

Evidently the same problem was found/fixed on the MacOS side. 

Does anyone know if this issue is Ventura-specific? That is, should folks still on older MacOS versions be concerned about this security hole?

MisterKit 8 Years · 514 comments

I have often wondered if security patches like this eliminate the problem if you already got infected, or if the patch just prevents you from being infected going forward.