Feds take notice of iOS vulnerabilities exploited under mysterious circumstances

Coruna can also be notable for its use by three distinct hacking groups. Google first detected its use in February of last 12 months in an operation conducted by a “customer of a surveillance vendor.” The vulnerability exploited, tracked as CVE-2025-23222, had been patched 13 months earlier. In July 2025, a “suspected Russian espionage group” exploited CVE-2023-43000 in attacks planted on web sites that were frequented by Ukrainian targets. Last December, when it was utilized by a “financially motivated threat actor from China,” Google was capable of retrieve the entire exploit kit.

“How this proliferation occurred is unclear, but suggests an lively marketplace for ‘second hand’ zero-day exploits,” Google wrote. “Beyond these identified exploits, multiple threat actors have now acquired advanced exploitation techniques that might be re-used and modified with newly identified vulnerabilities.”

Google researchers went on to jot down:

We retrieved all of the obfuscated exploits, including ending payloads. Upon further evaluation, we noticed an instance where the actor deployed the debug version of the exploit kit, leaving within the clear the entire exploits, including their internal code names. That’s after we learned that the exploit kit was likely named Coruna internally. In total, we collected a couple of hundred samples covering a complete of 5 full iOS exploit chains. The exploit kit is capable of goal various iPhone models running iOS version 13.0 (released in September 2019) as much as version 17.2.1 (released in December 2023).

The 23 exploits, together with the code names and other information, are:

TypeCodenameTargeted versions (inclusive)Fixed versionsCVE
WebContent R/Wbuffout13 → 15.1.115.2CVE-2021-30952
WebContent R/Wjacurutu15.2 → 15.515.6CVE-2022-48503
WebContent R/Wbluebird15.6 → 16.1.216.2No CVE
WebContent R/Wterrorbird16.2 → 16.5.116.6CVE-2023-43000
WebContent R/Wcassowary16.6 → 17.2.116.7.5, 17.3CVE-2024-23222
WebContent PAC bypassbreezy13 → 14.x?No CVE
WebContent PAC bypassbreezy1515 → 16.2?No CVE
WebContent PAC bypassseedbell16.3 → 16.5.1?No CVE
WebContent PAC bypassseedbell_16_616.6 → 16.7.12?No CVE
WebContent PAC bypassseedbell_1717 → 17.2.1?No CVE
WebContent sandbox escapeIronLoader16.0 → 16.3.116.4.0 (<= A12)15.7.8, 16.5CVE-2023-32409
WebContent sandbox escapeNeuronLoader16.4.0 → 16.6.1 (A13-A16)17.0No CVE
PENeutron13.X14.2CVE-2020-27932
PE (infoleak)Dynamo13.X14.2CVE-2020-27950
PEPendulum14 → 14.4.x14.7No CVE
PEPhoton14.5 → 15.7.615.7.7, 16.5.1CVE-2023-32434
PEParallax16.4 → 16.717.0CVE-2023-41974
PEGruber15.2 → 17.2.116.7.6, 17.3No CVE
PPL BypassQuark13.X14.5No CVE
PPL BypassGallium14.x15.7.8, 16.6CVE-2023-38606
PPL BypassCarbone15.0 → 16.7.617.0No CVE
PPL BypassSparrow17.0 → 17.316.7.6, 17.4CVE-2024-23225
PPL BypassRocket17.1 → 17.416.7.8, 17.5CVE-2024-23296

CISA is adding only three of the CVEs to its catalog. They’re:

  • CVE-2021-30952 Apple Multiple Products Integer Overflow or Wraparound Vulnerability
  • CVE-2023-41974 Apple iOS and iPadOS Use-After-Free Vulnerability
  • CVE-2023-43000 Apple Multiple products Use-After-Free Vulnerability

CISA is directing agencies to “apply mitigations per vendor instructions, follow applicable… guidance for cloud services, or discontinue use of the product if mitigations are unavailable.” The agency went on to warn: “All these vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.”

Related Post

Leave a Reply