Rapid Security Response Updates for iOS 16.5.1, macOS Ventura 13.4.1, Released

iOS Security Response Update

Apple Releases Rapid Security Response Updates for iOS 16.5.1 and macOS 13.4.1 to Fix Actively Exploited Vulnerability

Apple has issued Rapid Security Response Updates for iOS 16.5.1, iPadOS 16.5.1, and macOS Ventura 13.4.1 to address a known and actively exploited security vulnerability.

All users with an eligible device should update their iPhone, iPad, or Mac, to avoid any potential issues with the security flaw.

The new versions with the included security response will be iOS 16.5.1 (a), iPadOS 16.5.1 (a), and macOS Ventura 13.4.1 (a).

How to Install Security Response Updates for iOS 16.5.1 (a), iPadOS 16.5.1 (a)

Installing the security update on iPhone and iPad is simple:

  1. Go to “Settings” then go to “General”
  2. Go to “Software Update” and choose to “Download and Install” when you see “iOS Security Response Update 16.5.1 (a)” or “iPadOS Security Response Update 16.5.1 (a)”

The update is quite small at 1.4 MB (roughly the size of one of those old 3.5″ floppy diskettes) and installs quickly.

The iPhone or iPad will restart to complete installation.

How to Install Security Response Updates for MacOS Ventura 13.4.1 (a)

If you disabled the automatic Security Response Updates on Mac, iPhone, or iPad, you’ll need to manually update, just like you would with any other update to system software.

  1. Go to  Apple menu > “System Settings”
  2. Now go to “General”
  3. Go to “Software Update” and choose to update when you see “macOS Security Response Update 13.4.1 (a)” as available

If you do not see “macOS Security Response Update 13.4.1 (a)”, you may need to install macOS Ventura 13.4.1 first.

The Mac must also reboot to complete installation.

Release Notes for Security Response Updates iOS 16.5.1 (a), iPadOS 16.5.1 (a), and macOS Ventura 13.4.1 (a)

Security release notes for iOS 16.5.1 (a), iPadOS 16.5.1 (a), and macOS Ventura 13.4.1 (a) are as follows:

Impact: Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
Description: The issue was addressed with improved checks.
CVE-2023-37450: an anonymous researcher

Basically, this means the exploit can be activated from Safari, or perhaps the web in general (many apps use webkit embedded content), so this is a good one to patch right away.

Source

      Guidantech
      Logo
      Shopping cart