Apple has released Quick security response updates to iOS, iPadOS, macOS, and the Safari web browser for ADDRESS a zero-day fault that he said has been actively exploited in the wild.
The WebKit bug, listed as CVE-2023-37450, could allow threat actors to achieve arbitrary code execution by processing specially crafted web content. The iPhone maker said it addressed the issue with improved controls.
Credited with the discovery and reporting of the glitch is an anonymous researcher. As with most cases like this, there are few details about the nature and scale of the attacks and the identity of the threat actor behind them.
But Apple noted in a brief notice that it is “aware of a report that this issue may have been actively exploited.”
🔐 PAM Security: expert solutions to protect your sensitive accounts
This expert-led webinar will equip you with the knowledge and strategies you need to transform your privileged access security strategy.
The updates, iOS 16.5.1 (a), iPadOS 16.5.1 (a), macOS Ventura 13.4.1 (a), and Safari 16.5.2, are available for devices running the following operating system versions:
Apple has fixed 10 zero-day vulnerabilities in its software since early 2023. It also comes weeks after the company released patches to fix three days zerotwo of whom have been armed by unidentified actors in connection with a spy campaign called Triangulation Operation.
Update
apple has pulled the software update after reports emerged that installing the patches caused certain websites like Facebook, Instagram, and Zoom to throw an “Unsupported Browser” error in Safari.
Discover more from PressNewsAgency
Subscribe to get the latest posts sent to your email.