A PHP Error was encountered

Severity: 8192

Message: Return type of LayerShifter\TLDExtract\Result::offsetExists($offset) should either be compatible with ArrayAccess::offsetExists(mixed $offset): bool, or the #[\ReturnTypeWillChange] attribute should be used to temporarily suppress the notice

Filename: src/Result.php

Line Number: 189

Backtrace:

File: /home/u149759368/domains/techthop.com/public_html/application/third_party/domain-parser/layershifter/tld-extract/src/Result.php
Line: 27
Function: _error_handler

File: /home/u149759368/domains/techthop.com/public_html/application/third_party/domain-parser/composer/ClassLoader.php
Line: 444
Function: include

File: /home/u149759368/domains/techthop.com/public_html/application/third_party/domain-parser/composer/ClassLoader.php
Line: 322
Function: Composer\Autoload\includeFile

File: /home/u149759368/domains/techthop.com/public_html/application/third_party/domain-parser/layershifter/tld-extract/src/Extract.php
Line: 167
Function: loadClass

File: /home/u149759368/domains/techthop.com/public_html/application/third_party/domain-parser/layershifter/tld-extract/src/static.php
Line: 35
Function: parse

File: /home/u149759368/domains/techthop.com/public_html/index.php
Line: 331
Function: require_once

Here's how to fix CERT-In's Apple Watch security flaw

Science

Here's how to fix CERT-In's Apple Watch security flaw


By TechThop Team

Posted on: 26 Jul, 2022

Government officials have advised Apple Watch users who are using watchOS 8.7 or older versions of the device software to update their devices as soon as possible to the latest version of the software. 

Apple Watch models running on older versions of the watchOS operating system may be susceptible to a newly discovered vulnerability, as reported in a report by the Indian Computer Emergency Response Team (CERT-In).

In the case of this vulnerability, an attacker might be able to run arbitrary code on the device and bypass security restrictions in place.

An attacker could use these commands to bypass the smartwatch's security restrictions, allowing them access to private information on the smartwatch by bypassing the watch's security restrictions.

Based on the CERT-In vulnerability note, it appears that there are vulnerabilities in Apple Watch models that run on older software as a result of various flaws that have been found. Some of these issues include 'buffer overflow in AppleAVD component

Authorization issue in AppleMobileFileIntegrity component; out-of-bounds write in Audio, ICU, and WebKit components; type confusion in Multi-Touch component; multiple out-of-bounds write and memory corruption in GPU drivers component', among others.

There is a possibility that remote attackers could exploit these vulnerabilities by sending a specially crafted request to the server. If these vulnerabilities are exploited successfully, the attacker will be able to execute arbitrary code on the targeted system and bypass security restrictions on it', the note states.

For compatible Apple Watch models (Apple Watch Series 3 and above) as well as versions of the latest version of Apple's watchOS software, Apple has already released fixes for these security vulnerabilities in the latest version of its watchOS software.

The best way to update your Apple Watch is to make sure it has at least 50 percent battery life, that it is connected to a WiFi network and that you open the Settings app on the watch itself.

To update your device, you need to go to General/Software Update and follow the on-screen instructions if there is an update available. The latest version of the software is already installed on your computer if you see no new updates

For more stories like this

Explore our website

TAP FOR MORE