To address a zero-day flaw that it claims has been actively exploited in the wild, Apple has issued Rapid Security Response updates for iOS, iPadOS, macOS, and the Safari web browser.
When specially crafted web content is processed, threat actors may be able to execute arbitrary code thanks to the WebKit bug, which is listed as CVE-2023-37450. The iPhone producer said it resolved the issue with further developed checks.
Credited with finding and revealing the blemish is a mysterious scientist. Similarly as with most cases like this, there are inadequate insights concerning the nature and the size of the assaults and the character of the danger entertainer behind them.
Apple, on the other hand, stated in a brief statement that the company is “aware of a report that this issue may have been actively exploited.”
iOS 16.5.1 (a), iPadOS 16.5.1 (a), macOS Ventura 13.4.1 (a), and Safari 16.5.2 are the available updates for devices that are running the following versions of the operating system:
iOS 16.5.1 and iPadOS 16.5.1
macOS Ventura 13.4.1
macOS Large Sur and macOS Monterey
Apple has tended to 10 zero-day weaknesses in its product starting from the beginning of 2023. It additionally shows up weeks after the organization carried out patches to fix three zero-days, two of which have been weaponized by unidentified entertainers regarding a surveillance crusade called Activity Triangulation.