![]() ![]() Apple is encouraging users to upgrade to the latest versions of its software. ![]() The issue is fixed in iOS 15.6.1, iPadOS 15.6.1, and macOS Monterey 12.5.1. WebKit powers all iOS web browsers and Safari, so possible targets are iPhones, iPads, and Macs which could all be tricked into running unauthorized code.” ![]() “Since the vulnerability exists in Apple’s HTML rendering software (WebKit). “An attacker could lure a potential victim to a specially crafted website or use malvertising to compromise a vulnerable system by exploiting this vulnerability,” Malwarebytes said in a blog post today. While a patch offered for older devices may seem unimportant, cybercriminals are particularly fond of older unpatched technology, especially if the vulnerability gives them complete control and the ability to gain access to other systems and services. Even so, he said, anyone with one of the older devices should update as soon as possible. The fact that the issue affects that older group of devices - and not newer models - means that there are relatively few devices at risk, Gold noted. The vulnerabilities affect the iPhone 6, iPhone 6 Plus, iPad Air, iPad mini 2, iPad mini 3, and iPod touch (6th generation) and computers running older macOS versions. Apple is urging anyone with an iPhone, iPad of Mac computer to install their latest security measure, which is said to deliver important security improvements between software updates. Apple released a critical software patch to fix a security vulnerability that researchers said could allow hackers to directly infect iPhones and other Apple devices without any user action. “The issue is that if a web page is constructed in a certain way, it can cause code to execute on the device outside of the normal containment and effectively create a malware situation on the device that could compromise data, contacts, location, insert malicious SW, etc.,” said Jack Gold, principal analyst at J. ![]() Tags APFS Apple AppleScript Apple silicon backup Big Sur Blake bug Catalina Consolation Console diagnosis Disk Utility Doré El Capitan extended attributes Finder firmware Gatekeeper Gérôme HFS+ High Sierra history of painting iCloud Impressionism iOS landscape LockRattler log logs M1 Mac Mac history macOS macOS 10.12 macOS 10.13 macOS 10.14 macOS 10.The software flaws are listed in the Common Vulnerabilities and Exposures (CVE) database, a system funded by a division of the US Department of Homeland Security (DHS) to a ensure public disclosure of security vulnerabilities and exposures. Learn how to update the software on your iPhone, iPad, or iPod touch. The latest version of iOS and iPadOS is 16.4.1. Keeping your software up to date is one of the most important things you can do to maintain your Apple product's security. There’s also no sign of any accompanying security updates for Monterey or Big Sur, although there is a Safari update for both, which patches the WebKit vulnerability. Get the latest software updates from Apple. Otherwise very little appears to have changed beyond those three security fixes. There’s also a new (private) Shortcuts File Helper. There are small build number increments in Shortcuts, the IOSCSIArchitectureModelFamily kext, and the AppKit and Security frameworks. The new macOS build number is 22D68, and there are no firmware updates for Apple silicon or T2 Macs. Even Safari only increases its build number by one point, to version 16.3 (18614.4.6.1.6). This appears to be an urgent security update, as the three vulnerabilities it addresses include one in WebKit that Apple believes is possibly being exploited in the wild.įor Apple silicon Macs, this update is only 1.9 GB and should install briskly Intel Macs have a smaller download at just over 500 MB, but their penalty is in the time taken to install the update.Īpple’s update servers are currently busy, as there are also security updates to iOS and others.Īs expected with a security update, there are very few changes in version and build numbers. Apple has just released an update to bring macOS Ventura to version 13.2.1. ![]()
0 Comments
Leave a Reply. |