Apple this week has patched a wide range of security fixes, including one in WebKit that is being actively exploited and impacting all supported iPhones.
The security update, included in iOS 16.1.2, macOS Ventura, macOS Big Sur, macOS Monterey, Apple TV, fixes a bug that would allow arbitrary code execution if maliciously crafted web content were processed, Apple says.
Although the company fixed the operating systems for all of its devices (except its smart watches), the only known exploit was against versions of iOS prior to iOS 15.1, the company says.
“Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.1,” the company says on a support page.
The update rolled out to all supported iPhones, essentially iPhone 8 and later, meaning that the security bug impacted all iPhones. The company says the update fixed a type confusion issue and improved state handling.
The bug, officially listed as CVE-2022-42856, was reported by Clément Lecigne of Google’s Threat Analysis Group.
Essentially, any organization that manages their employees’ iPhones should ensure that this latest update is applied immediately.
However, the company also released a wide range of security fixes for all of its supported platforms, including watches, laptops, phones, tablets and more, according to cybersecurity firm Sophos.
Those fixes are included in macOS Ventura 13.1, macOS Monterey 12.6.2, macOS Big Sur 11.7.2, tvOS 16.2, watchOS 9.2, iOS 16.2 (recent devices only), iPadOS 16.2 (recent devices only), iOS 15.7.2 (earlier devices, back to iPhone 6s), and iPadOS 15.7.2 (earlier devices, including iPod touch 7th gen), Sophos researchers say in a blog.
In an advisory, the U.S. Cybersecurity and Infrastructure Security Agency urged users and administrators to review Apple’s security updates page and apply the necessary updates as soon as possible.
The security updates come a week after the company unveiled new security protections, including protections for user data, the ability to verify identity of contacts and support for third-party security keys.
If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!
Leave a Reply