Feds take notice of iOS vulnerabilities exploited under mysterious circumstances

Published: (March 6, 2026 at 02:41 PM EST)
4 min read

Source: Ars Technica

Coruna is notable for its use by three distinct hacking groups. Google first detected its use in February of last year in an operation conducted by a “customer of a surveillance vendor.” The vulnerability exploited, tracked as CVE‑2025‑23222, had been patched 13 months earlier. In July 2025, a “suspected Russian espionage group” exploited CVE‑2023‑43000 in attacks planted on websites frequented by Ukrainian targets. Last December, when it was used by a “financially motivated threat actor from China,” Google was able to retrieve the complete exploit kit.

“How this proliferation occurred is unclear, but suggests an active market for ‘second‑hand’ zero‑day exploits,” Google wrote. “Beyond these identified exploits, multiple threat actors have now acquired advanced exploitation techniques that can be re‑used and modified with newly identified vulnerabilities.”

Google researchers added:

We retrieved all the obfuscated exploits, including ending payloads. Upon further analysis, we noticed an instance where the actor deployed the debug version of the exploit kit, leaving in the clear all of the exploits, including their internal code names. That’s when we learned that the exploit kit was likely named Coruna internally. In total, we collected a few hundred samples covering a total of five full iOS exploit chains. The exploit kit is able to target various iPhone models running iOS 13.0 (released September 2019) up to iOS 17.2.1 (released December 2023).

Identified exploits

The 23 exploits, along with their code names, targeted iOS versions, fixed versions, and CVE identifiers, are listed below.

TypeCodenameTargeted versions (inclusive)Fixed versionsCVE
WebContent R/Wbuffout13 → 15.1.115.2CVE‑2021‑30952
WebContent R/Wjacurutu15.2 → 15.515.6CVE‑2022‑48503
WebContent R/Wbluebird15.6 → 16.1.216.2
WebContent R/Wterrorbird16.2 → 16.5.116.6CVE‑2023‑43000
WebContent R/Wcassowary16.6 → 17.2.116.7.5, 17.3CVE‑2024‑23222
WebContent PAC bypassbreezy13 → 14.x?
WebContent PAC bypassbreezy1515 → 16.2?
WebContent PAC bypassseedbell16.3 → 16.5.1?
WebContent PAC bypassseedbell_16_616.6 → 16.7.12?
WebContent PAC bypassseedbell_1717 → 17.2.1?
WebContent sandbox escapeIronLoader16.0 → 16.3.116.4.0 (≤ A12)15.7.8, 16.5CVE‑2023‑32409
WebContent sandbox escapeNeuronLoader16.4.0 → 16.6.1 (A13‑A16)17.0
PENeutron13.X14.2CVE‑2020‑27932
PE (infoleak)Dynamo13.X14.2CVE‑2020‑27950
PEPendulum14 → 14.4.x14.7
PEPhoton14.5 → 15.7.615.7.7, 16.5.1CVE‑2023‑32434
PEParallax16.4 → 16.717.0CVE‑2023‑41974
PEGruber15.2 → 17.2.116.7.6, 17.3
PPL BypassQuark13.X14.5
PPL BypassGallium14.x15.7.8, 16.6CVE‑2023‑38606
PPL BypassCarbone15.0 → 16.7.617.0
PPL BypassSparrow17.0 → 17.316.7.6, 17.4CVE‑2024‑23225
PPL BypassRocket17.1 → 17.416.7.8, 17.5CVE‑2024‑23296

CISA response

CISA is adding only three of the CVEs to its catalog:

  • CVE‑2021‑30952 – Apple Multiple Products Integer Overflow or Wraparound Vulnerability
  • CVE‑2023‑41974 – Apple iOS and iPadOS Use‑After‑Free Vulnerability
  • CVE‑2023‑43000 – Apple Multiple Products Use‑After‑Free Vulnerability

The agency advises federal entities to:

  • Apply mitigations per vendor instructions.
  • Follow applicable guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

CISA warns that “these types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.”

0 views
Back to Blog

Related posts

Read more »