Feds take notice of iOS vulnerabilities exploited under mysterious circumstances

iphone 14

Coruña is also notable for its use by three different hacking groups. Google first detected its use in February last year in an operation conducted by “a customer of a surveillance vendor.” The vulnerability, tracked as CVE-2025-23222, was fixed 13 months ago. In July 2025, a “suspected Russian espionage group” exploited CVE-2023-43000 in attacks against websites frequented by Ukrainian targets. Last December, Google was able to retrieve the entire exploit kit when it was used by a “financially motivated threat actor from China.”

“How this spread occurred is unclear, but ‘secondhand’ suggests an active market for zero-day exploits,” Google wrote. “In addition to these identified exploits, many threat actors have now acquired advanced exploit techniques that can be reused and modified with newly identified vulnerabilities.”

Google researchers further wrote:

We recovered all obfuscated exploits including the final payload. Upon further analysis, we observed an example where the actor deployed a debug version of the exploit kit, leaving all exploits in the clear, including their internal code names. That’s when we learned that the exploit kit was probably named Coruna internally. In total, we collected a few hundred samples covering a total of five complete iOS exploit chains. The exploit kit is capable of targeting various iPhone models running iOS version 13.0 (released in September 2019) to version 17.2.1 (released in December 2023).

The 23 exploits, including code names and other information, are as follows:

Type code name Target version (inclusive) definitive edition CVE
WebContent R/W buffout 13 → 15.1.1 15.2 CVE-2021-30952
WebContent R/W jacurutu 15.2 → 15.5 15.6 CVE-2022-48503
WebContent R/W bluebird 15.6 → 16.1.2 16.2 no cve
WebContent R/W terrorbird 16.2 → 16.5.1 16.6 CVE-2023-43000
WebContent R/W cassowary 16.6 → 17.2.1 16.7.5, 17.3 CVE-2024-23222
WebContent PAC Bypass breezy 13 → 14.x ? no cve
WebContent PAC Bypass airy15 15 → 16.2 ? no cve
WebContent PAC Bypass seed bell 16.3 → 16.5.1 ? no cve
WebContent PAC Bypass Seedbell_16_6 16.6 → 16.7.12 ? no cve
WebContent PAC Bypass seedbell_17 17 → 17.2.1 ? no cve
WebContent Sandbox Escape ironloader 16.0 → 16.3.116.4.0 (<=A12) 15.7.8, 16.5 CVE-2023-32409
WebContent Sandbox Escape Neuron Loader 16.4.0 → 16.6.1 (A13-A16) 17.0 no cve
PE neutron 13.x 14.2 CVE-2020-27932
PE(Infolake) dynamo 13.x 14.2 CVE-2020-27950
PE anchor 14 → 14.4.x 14.7 no cve
PE photon 14.5 → 15.7.6 15.7.7, 16.5.1 CVE-2023-32434
PE parallax 16.4 → 16.7 17.0 CVE-2023-41974
PE Gruber 15.2 → 17.2.1 16.7.6, 17.3 no cve
ppl bypass quark 13.x 14.5 no cve
ppl bypass gallium 14.x 15.7.8, 16.6 CVE-2023-38606
ppl bypass carbon 15.0 → 16.7.6 17.0 no cve
ppl bypass sparrow 17.0 → 17.3 16.7.617.4 CVE-2024-23225
ppl bypass rocket 17.1 → 17.4 16.7.8, 17.5 CVE-2024-23296

CISA is only adding three CVEs to its catalog. they are:

  • CVE-2021-30952 Apple multiple product integer overflow or wraparound vulnerabilities
  • CVE-2023-41974 Apple iOS and iPadOS use-after-free vulnerability
  • CVE-2023-43000 Apple multiple product use-after-free vulnerabilities

CISA is directing agencies to “implement mitigations in accordance with vendor instructions, follow applicable guidance for cloud services, or discontinue use of the product if mitigations are not available.” The agency warned: “These types of vulnerabilities are persistent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.”



<a href

Leave a Comment