The WebKit bug, cataloged as CVE-2023-37450, could allow threat actors to achieve arbitrary code execution when processing specially crafted web content. The iPhone maker said it addressed the issue with improved checks.
Credited with discovering and reporting the flaw is an anonymous researcher. As with most cases like this, there are scant details about the nature and the scale of the attacks and the identity of the threat actor behind them.
But Apple noted in a terse advisory that it's "aware of a report that this issue may have been actively exploited."
The updates, iOS 16.5.1 (a), iPadOS 16.5.1 (a), macOS Ventura 13.4.1 (a), and Safari 16.5.2, are available for devices running the following operating system versions:
Apple has addressed 10 zero-day vulnerabilities in its software since the start of 2023. It also arrives weeks after the company rolled out patches to fix three zero-days, two of which have been weaponized by unidentified actors in connection with an espionage campaign called Operation Triangulation.
Update (11 July, 2023)
In a support document released on July 11, 2023, Cupertino said it's "aware of an issue where recent Rapid Security Responses might prevent some websites from displaying properly," advising customers experiencing problems to remove the update. iOS 16.5.1 (b), iPadOS 16.5.1 (b), and macOS 13.4.1 (b) are expected to be released "soon" to remediate the problem.
Apple Reissues Zero-day Fixes (12 July, 2023)
Apple on Wednesday re-released updated Rapid Security Response (RSR) fixes for iOS, iPadOS, and macOS users, days after it pulled them after they were found to cause issues with Safari due to the way the updates were named. The updates are as follows -
- iOS 16.5.1 (c) and iPadOS 16.5.1 (c) - iOS 16.5.1 and iPadOS 16.5.1
- macOS Ventura 13.4.1 (c) - macOS Ventura 13.4.1