Using Apple Watch? CERT-in warns of major security flaw

/2 min read

ADVERTISEMENT

Instructions with a 'high' severity rating come from Meity’s nodal cyber security agency; they say any hacker could exploit these vulnerabilities from a remote place. Apple releases patches
Using Apple Watch? CERT-in warns of major security flaw
The CERT-In says any hacker could exploit these vulnerabilities from a remote place by sending a specially-crafted request. Credits: Special Arrangement

If you own an Apple smartwatch with watch OS versions prior to 8.7, you need to update it or hackers could bypass security on your device and steal all crucial data, including health and fitness and geo-location data, etc.

These instructions with a 'high' severity rating come from the Indian Computer Emergency Response Team (CERT-In), the nodal cyber security agency under the Ministry of Electronics and Information Technology (Meity).

The CERT-In says any hacker could exploit these vulnerabilities from a remote place by sending a specially-crafted request.

"Successful exploitation of these vulnerabilities could allow the attacker to execute arbitrary code and bypass security restrictions on the targeted system," says the agency.

The government agency has issued an advisory to Apple watch users, saying it contains "multiple vulnerabilities". The reason cited for these vulnerabilities are "buffer overflow in AppleAVD component; an authorisation issue in AppleMobile File Integrity component; out-of-bounds write in audio, ICU and WebKit component; type confusion in multi-touch component; multiple out-of-bounds write and memory corruption in GPU drivers component; out-of-bounds read in Kernel component; and memory initialisation in libxml2 component".

Fortune India Latest Edition is Out Now!
India's Top 100 Billionaires

August 2025

As India continues to be the world’s fastest-growing major economy, Fortune India presents its special issue on the nation’s Top 100 Billionaires. Curated in partnership with Waterfield Advisors, this year’s list reflects a slight decline in the number of dollar billionaires—from 185 to 182—even as the entry threshold for the Top 100 rose to ₹24,283 crore, up from ₹22,739 crore last year. From stalwarts like Mukesh Ambani, Gautam Adani, and the Mistry family, who continue to lead the list, to major gainers such as Sunil Mittal and Kumar Mangalam Birla, the issue goes beyond the numbers to explore the resilience, ambition, and strategic foresight that define India’s wealth creators. Read their compelling stories in the latest issue of Fortune India. On stands now.

Read Now

How to address issue

Apple issued a patch on these tech vulnerabilities on July 20 last week, asking users to apply its latest update WatchOS 8.7 to fix these security issues. The company says the Apple AVD component issue, which was also highlighted by CERT-in, is a buffer overflow problem that was addressed with improved bounds checking. It was first discovered by Google Project Zero researcher Natalie Silvanovich. It said the security vulnerability affected Apple Watch Series 3 and later.

Apple also cited a number of other vulnerabilities on its system, which have been fixed.

"For our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available," it says. Recent releases are also listed on the Apple security updates page.

Notably, tech majors like Google, Microsoft and Apple keep on bringing newer updates to their operating systems to keep their devices safe and secure.

Similarly, CERT-in has also issued a "high" severity warning for Microsoft Edge users of versions prior to 103.0.0.1264.71, saying there are "multiple vulnerabilities" in it, putting user data at risk.

"Multiple vulnerabilities have been reported in Microsoft Edge, which could allow a remote attacker to bypass security restrictions and to execute arbitrary code or cause a denial-of-service (DoS) condition on the targetted system," says the government agency.

As per CERT-in, these vulnerabilities exist in “Chromium Open-Source Software (OSS), which is consumed by Microsoft Edge due to use after free in Guest View, use after free in PDF, use after free in service worker API, use after free in views and insufficient validation of untrusted input in File”.

A remote attacker could exploit these vulnerabilities and allow the attacker to bypass security restrictions and execute arbitrary code or cause a denial-of-service (DoS) condition on the targetted system, it adds.

Fortune India is now on WhatsApp! Get the latest updates from the world of business and economy delivered straight to your phone. Subscribe now.