{"id":95319,"date":"2022-02-10T22:20:35","date_gmt":"2022-02-11T06:20:35","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=95319"},"modified":"2022-02-16T10:55:25","modified_gmt":"2022-02-16T18:55:25","slug":"apple-fixes-active-zero-day-vuln-with-macos-12-2-1-ios-15-3-1-safari-15-3","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/apple-fixes-active-zero-day-vuln-with-macos-12-2-1-ios-15-3-1-safari-15-3\/","title":{"rendered":"Apple fixes active zero-day vuln with macOS 12.2.1, iOS 15.3.1, Safari 15.3"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-86452\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/03\/ios-software-update-available-icon-600x300-e1558142227486.png\" alt=\"\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/03\/ios-software-update-available-icon-600x300-e1558142227486.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/03\/ios-software-update-available-icon-600x300-e1558142227486-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/03\/ios-software-update-available-icon-600x300-e1558142227486-300x150.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>On Thursday, Apple released security updates for macOS Monterey, iOS, iPadOS, and Safari to fix an actively exploited vulnerability.<\/p>\n<p>Apple describes the single vulnerability as follows:<\/p>\n<blockquote><p><strong>WebKit<\/strong><\/p>\n<p>Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2 and later, iPad 5th generation and later, iPad mini 4 and later, and iPod touch (7th generation)<\/p>\n<p>Available for: macOS Monterey<\/p>\n<p>Available for: macOS Big Sur and macOS Catalina [as Safari 15.3]\n<p>&nbsp;<\/p>\n<p>Impact: Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.<\/p>\n<p>&nbsp;<\/p>\n<p>Description: A use after free issue was addressed with improved memory management.<\/p>\n<p>&nbsp;<\/p>\n<p>CVE-2022-22620: an anonymous researcher<\/p><\/blockquote>\n<p>Little additional information is available about this specific vulnerability. However, given that Apple says that it &#8220;may have been active exploited&#8221;\u2014meaning that it has reportedly been used in at least one in-the-wild attack\u2014it&#8217;s important to update quickly.<\/p>\n<p>After installing the latest updates, the new version numbers will be as follows:<\/p>\n<ul>\n<li><strong>iOS 15.3.1<\/strong><\/li>\n<li><strong>iPadOS 15.3.1<\/strong><\/li>\n<li><strong>macOS Monterey 12.2.1<\/strong><\/li>\n<li><strong>Safari 15.3<\/strong> (build number 16612.4.9.1.8 for Big Sur, or 15612.4.9.1.8 for Catalina)<\/li>\n<\/ul>\n<p>The &#8220;actively exploited&#8221; nature of this vulnerability has <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisa-orders-federal-agencies-to-update-iphones-macs-until-feb-25th\/\" target=\"_blank\" rel=\"noopener\">prompted<\/a> the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to order federal agencies to patch their affected systems no later than February 25.<\/p>\n<p>Apple also released <strong>watchOS 8.4.2<\/strong> on Thursday, which contained &#8220;no published CVE entries&#8221;\u2014meaning that if any security updates were included, Apple is not disclosing them at this time.<\/p>\n<p>It is unclear whether other Apple software, such as watchOS, tvOS, and iCloud for Windows, may require WebKit updates to address this vulnerability as well. If so, Apple may release additional updates in the near future.<\/p>\n<h3>How to update to iOS 15.3.1 and iPadOS 15.3.1<\/h3>\n<p>To install the latest iOS or iPadOS updates, check the Settings app on your device: <strong>Settings<\/strong> &gt; <strong>General<\/strong> &gt; <strong>Software Update<\/strong>. The process is the same regardless of whether you use an iPhone, iPad, or iPod touch.<\/p>\n<h3>How to install watchOS 8.4.2<\/h3>\n<p>To install the latest watchOS update, make sure your iPhone is up to date first. Then ensure that your phone and watch are both connected to the same Wi-Fi network, and that your watch battery is charged to at least a 50%. Then open the Watch app on your phone, and tap <strong>General<\/strong> &gt; <strong>Software Update<\/strong>.<\/p>\n<h3>How to update to the latest macOS and Safari versions<\/h3>\n<p>You can get the latest macOS version (or Safari version) that&#8217;s compatible with your Mac by clicking on <strong>Apple menu<\/strong> &gt;\u00a0<strong>System Preferences\u2026<\/strong> &gt; <strong>Software Update<\/strong>.<\/p>\n<p>If your Mac is running macOS High Sierra or older, look for macOS Monterey in the App Store and download it from there.<\/p>\n<p>Note that although Apple released Safari updates for macOS Big Sur and macOS Catalina, it is best to upgrade to macOS Monterey if possible. Apple does not patch every security issue for older macOS versions; see <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-potentially-make-users-security-and-privacy-precarious\/\">Apple\u2019s Poor Patching Policies Potentially Make Users\u2019 Security and Privacy Precarious<\/a>.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"Cj9s89NVgO\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-potentially-make-users-security-and-privacy-precarious\/\">Apple&#8217;s Poor Patching Policies Potentially Make Users&#8217; Security and Privacy Precarious<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Apple&#8217;s Poor Patching Policies Potentially Make Users&#8217; Security and Privacy Precarious&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-potentially-make-users-security-and-privacy-precarious\/embed\/#?secret=Cj9s89NVgO\" data-secret=\"Cj9s89NVgO\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<h3>How to back up your Apple device before updating it<\/h3>\n<p>Whether you&#8217;re using iOS, iPadOS, or macOS, always back up your data before installing any updates. This gives you a restore point if something does not go as planned.<\/p>\n<p>For details on how to back up your iPhone to your Mac or to iCloud (or both), see <a href=\"https:\/\/www.intego.com\/mac-security-blog\/should-you-back-up-your-ios-device-to-icloud-or-itunes\/\">Should You Back Up Your iOS Device to iCloud or Your Mac?<\/a><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"H6E21vEG5H\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/should-you-back-up-your-ios-device-to-icloud-or-itunes\/\">Should You Back Up Your iOS Device to iCloud or Your Mac?<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Should You Back Up Your iOS Device to iCloud or Your Mac?&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/should-you-back-up-your-ios-device-to-icloud-or-itunes\/embed\/#?secret=H6E21vEG5H\" data-secret=\"H6E21vEG5H\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>For backing up your Mac, it&#8217;s ideal to follow a &#8220;<a href=\"https:\/\/www.intego.com\/mac-security-blog\/data-backup-plan-how-to-implement-the-3-2-1-backup-strategy\/\">3-2-1 backup strategy<\/a>,&#8221; and to occasionally <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-verify-your-backups-are-working-properly\/\">verify that your Mac is backing up successfully<\/a>.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"5PYOsE58bS\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/data-backup-plan-how-to-implement-the-3-2-1-backup-strategy\/\">Data Backup Plan: How to Implement the 3-2-1 Backup Strategy<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Data Backup Plan: How to Implement the 3-2-1 Backup Strategy&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/data-backup-plan-how-to-implement-the-3-2-1-backup-strategy\/embed\/#?secret=5PYOsE58bS\" data-secret=\"5PYOsE58bS\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"eweNyyFJqW\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-verify-your-backups-are-working-properly\/\">How to Verify Your Backups are Working Properly<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;How to Verify Your Backups are Working Properly&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-verify-your-backups-are-working-properly\/embed\/#?secret=eweNyyFJqW\" data-secret=\"eweNyyFJqW\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<h3>How can I learn more?<\/h3>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes!<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Twitter-logo-icon-64.png\" alt=\"Follow Intego on Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Facebook-logo-icon-64.png\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/YouTube-logo-icon-64.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Pinterest-logo-icon-64.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/LinkedIn-logo-icon-64.png\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Instagram-logo-icon-64.png\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>On Thursday, Apple released security updates for macOS Monterey, iOS, iPadOS, and Safari to fix an actively exploited WebKit vulnerability.<\/p>\n","protected":false},"author":14,"featured_media":85426,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7],"tags":[4627,4618,201],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"On Thursday, Apple released security updates for macOS Monterey, iOS, iPadOS, and Safari to fix an actively exploited WebKit vulnerability.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-fixes-active-zero-day-vuln-with-macos-12-2-1-ios-15-3-1-safari-15-3\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple fixes active zero-day vuln with macOS 12.2.1, iOS 15.3.1, Safari 15.3 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"On Thursday, Apple released security updates for macOS Monterey, iOS, iPadOS, and Safari to fix an actively exploited WebKit vulnerability.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/apple-fixes-active-zero-day-vuln-with-macos-12-2-1-ios-15-3-1-safari-15-3\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-11T06:20:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-02-16T18:55:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/ios-software-update-available-icon-400x260.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-fixes-active-zero-day-vuln-with-macos-12-2-1-ios-15-3-1-safari-15-3\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/ios-software-update-available-icon-400x260.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/ios-software-update-available-icon-400x260.png\",\"width\":400,\"height\":260,\"caption\":\"iOS software update available icon\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-fixes-active-zero-day-vuln-with-macos-12-2-1-ios-15-3-1-safari-15-3\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-fixes-active-zero-day-vuln-with-macos-12-2-1-ios-15-3-1-safari-15-3\/\",\"name\":\"Apple fixes active zero-day vuln with macOS 12.2.1, iOS 15.3.1, Safari 15.3 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-fixes-active-zero-day-vuln-with-macos-12-2-1-ios-15-3-1-safari-15-3\/#primaryimage\"},\"datePublished\":\"2022-02-11T06:20:35+00:00\",\"dateModified\":\"2022-02-16T18:55:25+00:00\",\"description\":\"On Thursday, Apple released security updates for macOS Monterey, iOS, iPadOS, and Safari to fix an actively exploited WebKit vulnerability.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-fixes-active-zero-day-vuln-with-macos-12-2-1-ios-15-3-1-safari-15-3\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-fixes-active-zero-day-vuln-with-macos-12-2-1-ios-15-3-1-safari-15-3\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-fixes-active-zero-day-vuln-with-macos-12-2-1-ios-15-3-1-safari-15-3\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple fixes active zero-day vuln with macOS 12.2.1, iOS 15.3.1, Safari 15.3\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-fixes-active-zero-day-vuln-with-macos-12-2-1-ios-15-3-1-safari-15-3\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-fixes-active-zero-day-vuln-with-macos-12-2-1-ios-15-3-1-safari-15-3\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Apple fixes active zero-day vuln with macOS 12.2.1, iOS 15.3.1, Safari 15.3\",\"datePublished\":\"2022-02-11T06:20:35+00:00\",\"dateModified\":\"2022-02-16T18:55:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-fixes-active-zero-day-vuln-with-macos-12-2-1-ios-15-3-1-safari-15-3\/#webpage\"},\"wordCount\":706,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-fixes-active-zero-day-vuln-with-macos-12-2-1-ios-15-3-1-safari-15-3\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/ios-software-update-available-icon-400x260.png\",\"keywords\":[\"iOS 15\",\"macOS Monterey\",\"Security Updates\"],\"articleSection\":[\"Apple\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-fixes-active-zero-day-vuln-with-macos-12-2-1-ios-15-3-1-safari-15-3\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"On Thursday, Apple released security updates for macOS Monterey, iOS, iPadOS, and Safari to fix an actively exploited WebKit vulnerability.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/apple-fixes-active-zero-day-vuln-with-macos-12-2-1-ios-15-3-1-safari-15-3\/","og_locale":"en_US","og_type":"article","og_title":"Apple fixes active zero-day vuln with macOS 12.2.1, iOS 15.3.1, Safari 15.3 - The Mac Security Blog","og_description":"On Thursday, Apple released security updates for macOS Monterey, iOS, iPadOS, and Safari to fix an actively exploited WebKit vulnerability.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/apple-fixes-active-zero-day-vuln-with-macos-12-2-1-ios-15-3-1-safari-15-3\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2022-02-11T06:20:35+00:00","article_modified_time":"2022-02-16T18:55:25+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/ios-software-update-available-icon-400x260.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-fixes-active-zero-day-vuln-with-macos-12-2-1-ios-15-3-1-safari-15-3\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/ios-software-update-available-icon-400x260.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/ios-software-update-available-icon-400x260.png","width":400,"height":260,"caption":"iOS software update available icon"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-fixes-active-zero-day-vuln-with-macos-12-2-1-ios-15-3-1-safari-15-3\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/apple-fixes-active-zero-day-vuln-with-macos-12-2-1-ios-15-3-1-safari-15-3\/","name":"Apple fixes active zero-day vuln with macOS 12.2.1, iOS 15.3.1, Safari 15.3 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-fixes-active-zero-day-vuln-with-macos-12-2-1-ios-15-3-1-safari-15-3\/#primaryimage"},"datePublished":"2022-02-11T06:20:35+00:00","dateModified":"2022-02-16T18:55:25+00:00","description":"On Thursday, Apple released security updates for macOS Monterey, iOS, iPadOS, and Safari to fix an actively exploited WebKit vulnerability.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-fixes-active-zero-day-vuln-with-macos-12-2-1-ios-15-3-1-safari-15-3\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-fixes-active-zero-day-vuln-with-macos-12-2-1-ios-15-3-1-safari-15-3\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-fixes-active-zero-day-vuln-with-macos-12-2-1-ios-15-3-1-safari-15-3\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Apple fixes active zero-day vuln with macOS 12.2.1, iOS 15.3.1, Safari 15.3"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-fixes-active-zero-day-vuln-with-macos-12-2-1-ios-15-3-1-safari-15-3\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-fixes-active-zero-day-vuln-with-macos-12-2-1-ios-15-3-1-safari-15-3\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Apple fixes active zero-day vuln with macOS 12.2.1, iOS 15.3.1, Safari 15.3","datePublished":"2022-02-11T06:20:35+00:00","dateModified":"2022-02-16T18:55:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-fixes-active-zero-day-vuln-with-macos-12-2-1-ios-15-3-1-safari-15-3\/#webpage"},"wordCount":706,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-fixes-active-zero-day-vuln-with-macos-12-2-1-ios-15-3-1-safari-15-3\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/ios-software-update-available-icon-400x260.png","keywords":["iOS 15","macOS Monterey","Security Updates"],"articleSection":["Apple"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-fixes-active-zero-day-vuln-with-macos-12-2-1-ios-15-3-1-safari-15-3\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/ios-software-update-available-icon-400x260.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-oNp","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/95319"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=95319"}],"version-history":[{"count":22,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/95319\/revisions"}],"predecessor-version":[{"id":95374,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/95319\/revisions\/95374"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/85426"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=95319"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=95319"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=95319"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}