Comment by input_sh
2 days ago
You're not gonna find technical details in an AP article of all places.
You will find it in CitizenLab's report: https://citizenlab.ca/2025/06/first-forensic-confirmation-of...
2 days ago
You're not gonna find technical details in an AP article of all places.
You will find it in CitizenLab's report: https://citizenlab.ca/2025/06/first-forensic-confirmation-of...
There isn’t much technical details there either. They list the servers it connected to and log entry but that’s it.
It mentions a CVE number but the apple link is generic and mo details on the CVE database.
Has this even been fixed by apple?
we talking about state sponsored actor with zero day vuln here
You would not find info anywhere
It's no longer a zero day if Apple already patched it.
1 reply →
Why not?
I replied to the parent comment with the info I found:
https://news.ycombinator.com/item?id=44274249
Tl;DR: yes, this was resolved in iOS 18.3.1