Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CISA Adds iOS Flaws From Coruna Exploit Kit to KEV List

0
Medium
Exploitios
Published: Fri Mar 06 2026 (03/06/2026, 13:18:12 UTC)
Source: SecurityWeek

Description

The nation-state-grade iOS exploit kit targets 23 vulnerabilities affecting iOS 13 to 17.2.1. The post CISA Adds iOS Flaws From Coruna Exploit Kit to KEV List appeared first on SecurityWeek .

AI-Powered Analysis

AILast updated: 03/06/2026, 13:30:26 UTC

Technical Analysis

The Coruna Exploit Kit represents a highly advanced and targeted threat developed by a nation-state actor, focusing on exploiting a set of 23 vulnerabilities across multiple iOS versions, from 13 up to 17.2.1. These vulnerabilities span a wide range of potential weaknesses, likely including memory corruption, sandbox escape, and privilege escalation flaws, which collectively enable attackers to execute arbitrary code, bypass security controls, or gain unauthorized access to sensitive data on iOS devices. The inclusion of these flaws in CISA's Known Exploited Vulnerabilities (KEV) list underscores their critical importance and the likelihood of exploitation attempts in the near future. While no active exploitation has been observed yet, the exploit kit's design suggests it can be deployed remotely and possibly without requiring user interaction, increasing the risk to end users and organizations. The exploit kit's targeting of multiple iOS versions indicates a broad attack surface affecting a large population of devices globally. The technical sophistication and nation-state attribution imply that the exploit kit could be used for espionage, data theft, or disruption of critical communications. Due to the lack of publicly available patches linked directly to this advisory, organizations must rely on vendor updates and threat intelligence to mitigate risks. The threat is particularly relevant to sectors with high iOS device usage, including government, defense, finance, and critical infrastructure.

Potential Impact

The Coruna Exploit Kit poses a significant threat to the confidentiality, integrity, and availability of iOS devices worldwide. Successful exploitation could allow attackers to execute arbitrary code with elevated privileges, leading to unauthorized data access, surveillance, or device control. This could compromise sensitive communications, intellectual property, and personal data, especially in high-value targets such as government agencies, defense contractors, and financial institutions. The broad range of affected iOS versions means a large number of devices remain vulnerable, increasing the potential scale of impact. The exploit kit's nation-state-grade sophistication suggests targeted attacks with strategic objectives, potentially disrupting critical operations or enabling long-term espionage campaigns. Organizations relying heavily on iOS devices for secure communications and operations face increased risk of data breaches and operational disruption. The absence of known exploits in the wild currently provides a window for proactive defense, but the threat landscape could rapidly evolve.

Mitigation Recommendations

Organizations should immediately verify that all iOS devices are updated to the latest available versions, as Apple regularly releases security patches addressing known vulnerabilities. Given the range of affected iOS versions, device management policies should enforce mandatory updates and restrict usage of outdated versions. Employ Mobile Device Management (MDM) solutions to monitor device compliance and remotely enforce security configurations. Enhance network-level protections by implementing intrusion detection and prevention systems capable of identifying exploit kit activity and anomalous traffic patterns. Educate users about the risks of unsolicited links or attachments, as exploit kits often leverage phishing or drive-by downloads. Collaborate with threat intelligence providers to stay informed about emerging indicators of compromise related to the Coruna Exploit Kit. For high-risk environments, consider deploying endpoint detection and response (EDR) tools tailored for iOS to detect suspicious behavior. Finally, establish incident response plans specifically addressing iOS compromise scenarios to enable rapid containment and remediation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Threat ID: 69aad6e5c48b3f10ff88b243

Added to database: 3/6/2026, 1:30:13 PM

Last enriched: 3/6/2026, 1:30:26 PM

Last updated: 3/7/2026, 7:46:29 AM

Views: 508

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses