	{"id":96687,"date":"2022-12-14T23:27:22","date_gmt":"2022-12-15T07:27:22","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=96687"},"modified":"2022-12-22T22:26:11","modified_gmt":"2022-12-23T06:26:11","slug":"apple-releases-macos-ventura-13-1-ios-16-2-and-more-fixes-zero-day-vuln","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-ventura-13-1-ios-16-2-and-more-fixes-zero-day-vuln\/","title":{"rendered":"Apple releases macOS Ventura 13.1, iOS 16.2, and more; fixes zero-day vuln"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-86452\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/03\/ios-software-update-available-icon-600x300-e1558142227486.png\" alt=\"\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/03\/ios-software-update-available-icon-600x300-e1558142227486.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/03\/ios-software-update-available-icon-600x300-e1558142227486-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/03\/ios-software-update-available-icon-600x300-e1558142227486-300x150.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>On Tuesday, December 13, Apple released updates for its operating systems. These included iOS and iPadOS 16.2 as well as macOS Ventura 13.1, introducing new features as well as bug and security fixes. An &#8220;actively exploited&#8221; (i.e. zero-day, in-the-wild) vulnerability was fixed for most operating systems.<\/p>\n<p>Let&#8217;s take a look at some of the new features, bug fixes, and security patches included in these updates.<\/p>\n<p>In this article:<\/p>\n<ul>\n<li><a href=\"#0d\">Apple addresses zero-day vulnerability<\/a><\/li>\n<li><a href=\"#vent\">macOS Ventura 13.1<\/a><\/li>\n<li><a href=\"#mont\">macOS Monterey 12.6.2<\/a><\/li>\n<li><a href=\"#bs\">macOS Big Sur 11.7.2<\/a><\/li>\n<li><a href=\"#saf\">Safari 16.2<\/a><\/li>\n<li><a href=\"#16\">iOS 16.2 and iPadOS 16.2<\/a><\/li>\n<li><a href=\"#15\">iOS 15.7.2 and iPadOS 15.7.2<\/a><\/li>\n<li><a href=\"#12\">iOS 12: No security updates<\/a><\/li>\n<li><a href=\"#wat\">watchOS 9.2<\/a><\/li>\n<li><a href=\"#8\">watchOS 8: No security updates<\/a><\/li>\n<li><a href=\"#tv\">tvOS 16.2<\/a><\/li>\n<li><a href=\"#hom\">audioOS 16.2<\/a><\/li>\n<li><a href=\"#keys\">Key takeaways<\/a><\/li>\n<li><a href=\"#learnmore\">How can I learn more?<\/a><a name=\"0d\"><\/a><\/li>\n<\/ul>\n<h3>Apple addresses zero-day vulnerability<\/h3>\n<p>First let&#8217;s take a look at the zero-day vulnerability that Apple addressed for multiple operating systems. Apple says of the update:<\/p>\n<blockquote><p><strong>WebKit<br \/>\n<\/strong>Impact: Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.1.<br \/>\nDescription: A type confusion issue was addressed with improved state handling.<br \/>\nCVE-2022-42856: Cl\u00e9ment Lecigne of Google&#8217;s Threat Analysis Group<\/p><\/blockquote>\n<p>Thirteen days earlier, Apple addressed this vulnerability in <a href=\"https:\/\/support.apple.com\/en-us\/HT213516\" target=\"_blank\" rel=\"noopener\">iOS 16.1.2<\/a>, released on November 30. It was the only security issue that Apple has (so far) indicated was addressed in that update. Strangely, iPadOS didn&#8217;t receive an update at the time, and the release notes for this week&#8217;s iPadOS 16.2 update do not list this vulnerability as having been addressed.<\/p>\n<p>However, several other operating systems received a fix for this vulnerability in this Tuesday&#8217;s patch update cycle:<\/p>\n<ul>\n<li>macOS Ventura 13.1<\/li>\n<li>macOS Monterey and macOS Big Sur (addressed in Safari 16.2)<\/li>\n<li>iOS 15.7.2 and iPadOS 15.7.2<\/li>\n<li>tvOS 16.2<\/li>\n<\/ul>\n<p>For unknown reasons, the following operating systems are absent from that list:<\/p>\n<ul>\n<li><del>iPadOS 16.2\u00a0<\/del> <em>Update: Apple acknowledged on December 22 that iPads received this fix in iPadOS 16.2.<\/em><\/li>\n<li>watchOS 9.2<\/li>\n<li>watchOS 8.7.x for Apple Watch Series 3 (which Apple still sells refurbished)<\/li>\n<li>Windows (not addressed in <a href=\"https:\/\/support.apple.com\/kb\/HT213538\" target=\"_blank\" rel=\"noopener\">iCloud for Windows 14.1<\/a>, which was also released this week and addressed three other vulnerabilities, including two in WebKit)<\/li>\n<\/ul>\n<p>It is unclear why these operating systems seemingly remain unpatched. Perhaps the vulnerability does not exist on these operating systems, or perhaps it exists but Apple does not believe it is exploitable. Or perhaps the issue was addressed but Apple just neglected to mention it. Alternatively, perhaps these operating systems remain vulnerable. Any of these scenarios is plausible.<\/p>\n<p>Intego has reached out to Apple for comment. If Apple replies, this article will be updated with the company&#8217;s response. <em>Update: Apple <a href=\"https:\/\/www.intego.com\/mac-security-blog\/microsoft-discovers-new-gatekeeper-bypass-apple-updates-past-security-advisories\/\">publicly acknowledged on December 22<\/a> that iPads received this fix in iPadOS 16.2. However, Apple has not yet responded regarding whether watchOS or Windows systems remain vulnerable.<\/em><a name=\"vent\"><\/a><\/p>\n<h3>macOS Ventura 13.1<\/h3>\n<p><strong>Available for:<\/strong><br \/>\nMac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017)<\/p>\n<p><strong>New features:<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-freeform-lets-you-brainstorm-and-collaborate-on-mac-ipad-and-iphone\/\" rel=\"noopener\">Freeform<\/a>, a new app for working creatively with friends or colleagues on Mac, iPad, and iPhone<\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/apples-advanced-data-protection-and-other-features-harden-security\/\">Advanced Data Protection for iCloud<\/a>, an opt-in feature that can enable end-to-end encryption for more iCloud data categories on all devices associated with your Apple ID<\/li>\n<\/ul>\n<p><strong>Enterprise:<\/strong><\/p>\n<p>Enterprise users see the welcome return of Network Locations, reliability improvements when using DHCPv6, a resolution for an issue causing printers to be removed after a software update, and <a href=\"https:\/\/support.apple.com\/en-us\/HT213327\" target=\"_blank\" rel=\"noopener\">more<\/a>.<\/p>\n<p><strong>Improvements and bug fixes:<\/strong><\/p>\n<ul>\n<li>Improved search in Messages allows you to find photos based on their content, like a dog, car, person, or text<\/li>\n<li>Participant Cursors in Notes allow you to see live indicators as others make updates in a shared note<\/li>\n<li>Play sound in Find My app can now help you pinpoint the location of nearby AirTags, AirPods Pro (2nd generation) case, and Find My network accessories<\/li>\n<li>Fixes an issue that causes some notes not to sync with iCloud after updates are made<\/li>\n<li>Fixes an issue where you may lose keyboard and mouse input in some apps and games<\/li>\n<\/ul>\n<p><strong>Security-related fixes and updates:<\/strong><br \/>\nAt least 36 vulnerabilities were addressed in this update. Here are a few notable ones:<\/p>\n<blockquote><p><strong>Accounts<br \/>\n<\/strong>Impact: A user may be able to view sensitive user information<br \/>\nDescription: This issue was addressed with improved data protection.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>AppleMobileFileIntegrity, CoreServices and Printing<br \/>\n<\/strong>Impact: An app may be able to bypass Privacy preferences<br \/>\nDescription: This issue was addressed by enabling hardened runtime.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Kernel<br \/>\n<\/strong>Impact: An app may be able to break out of its sandbox<br \/>\nDescription: This issue was addressed with improved checks.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Safari<br \/>\n<\/strong>Impact: Visiting a website that frames malicious content may lead to UI spoofing<br \/>\nDescription: A spoofing issue existed in the handling of URLs. This issue was addressed with improved input validation.<\/p><\/blockquote>\n<p>Of the 36 identified fixes, five are for the kernel (the core of the OS) and 10 are for WebKit (the page-rendering engine used by Safari and other apps). This includes the vulnerability mentioned above that may have been actively exploited. The complete list can be seen <a href=\"https:\/\/support.apple.com\/en-us\/HT213532\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p>This may also be the first version of macOS Ventura that supports <a href=\"https:\/\/support.apple.com\/guide\/deployment\/rapid-security-responses-dep93ff7ea78\/web\" target=\"_blank\" rel=\"noopener\">Rapid Security Responses<\/a>, which Apple describes as &#8220;a mechanism for shipping security fixes to users more frequently,&#8221; but this has not yet been confirmed.<\/p>\n<p>You can get this new macOS update by going to <strong>System Preferences<\/strong> &gt; <strong>Software Update<\/strong>, where compatible Macs running macOS Mojave or newer will see the Ventura update appear. If your Mac is running macOS High Sierra or older, look for macOS Ventura in the App Store and download it from there.<a name=\"mont\"><\/a><\/p>\n<h3>macOS Monterey 12.6.2<\/h3>\n<p><strong>Available for:<\/strong><br \/>\nAll supported Macs currently running macOS Monterey<\/p>\n<p><strong>Security-related fixes and updates:<\/strong><br \/>\nAt least 13 vulnerabilities were addressed in this update, most of which were also addressed in macOS Ventura 13.1. For the full list of security patches included in Monterey 12.6.2, <a href=\"https:\/\/support.apple.com\/en-us\/HT213533\" target=\"_blank\" rel=\"noopener\">have a look here<\/a>.<\/p>\n<p>One notable vulnerability, which Apple disclosed as previously having been silently patched in macOS Ventura 13, was also addressed for both macOS Monterey 12.6.2 and macOS Big Sur 11.7.2:<\/p>\n<blockquote><p><strong>BOM<br \/>\n<\/strong>Impact: An app may bypass Gatekeeper checks<br \/>\nDescription: A logic issue was addressed with improved checks.<br \/>\nCVE-2022-42821: Jonathan Bar Or of Microsoft<\/p><\/blockquote>\n<p>For additional details about the Gatekeeper bypass vulnerability, see our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/microsoft-discovers-new-gatekeeper-bypass-apple-updates-past-security-advisories\/\">featured article<\/a> about it.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"lVCpdukPLY\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/microsoft-discovers-new-gatekeeper-bypass-apple-updates-past-security-advisories\/\">Microsoft discovers new Gatekeeper bypass; Apple updates past security advisories<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Microsoft discovers new Gatekeeper bypass; Apple updates past security advisories&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/microsoft-discovers-new-gatekeeper-bypass-apple-updates-past-security-advisories\/embed\/#?secret=lVCpdukPLY\" data-secret=\"lVCpdukPLY\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>You can get this update by going to <strong>System Preferences<\/strong> &gt; <strong>Software Update<\/strong>, where compatible Macs running macOS Mojave or newer will see the Monterey update appear.<a name=\"bs\"><\/a><\/p>\n<h3>macOS Big Sur 11.7.2<\/h3>\n<p><strong>Available for:<\/strong><br \/>\nAll supported Macs currently running macOS Big Sur<\/p>\n<p><strong>Security-related fixes and updates:<\/strong><br \/>\nAt least 10 vulnerabilities were addressed in this update, including the aforementioned BOM vulnerability that could be used to bypass Gatekeeper. All of the vulnerabilities addressed in this Big Sur update were also addressed in macOS Monterey 12.6.2. For the full list of security patches included in macOS Big Sur 11.7.2, <a href=\"https:\/\/support.apple.com\/en-us\/HT213534\" target=\"_blank\" rel=\"noopener\">have a look here<\/a>.<\/p>\n<p>You can get this update by going to <strong>System Preferences<\/strong> &gt; <strong>Software Update<\/strong>, where compatible Macs running macOS Mojave or newer will see the Monterey update appear.<a name=\"saf\"><\/a><\/p>\n<h3>Safari 16.2<\/h3>\n<p><strong>Available for:<\/strong><br \/>\nmacOS Monterey and macOS Big Sur<\/p>\n<p>This update addresses the aforementioned 10 WebKit issues fixed in macOS Ventura 13.1, including the one that may have been actively exploited. This Safari update will protect Macs on the latest versions of Monterey and Big Sur from this particular vulnerability. The list of fixes <a href=\"https:\/\/support.apple.com\/en-us\/HT213537\" target=\"_blank\" rel=\"noopener\">can be seen here<\/a>.<\/p>\n<p>Safari 16.2 is available in <strong>System Preferences<\/strong> &gt;<strong> Software Update<\/strong> on Macs running either macOS Monterey or Big Sur. It will appear as an available update once macOS Monterey 12.6.2 or Big Sur 11.7.2 has been installed.<a name=\"16\"><\/a><\/p>\n<h3>iOS 16.2 and iPadOS 16.2<\/h3>\n<p><strong>Available for:<\/strong><br \/>\niPhone 8 and later, iPad Pro (all models), iPad Air 3rd generation and later, iPad 5th generation and later, and iPad mini 5th generation and later<\/p>\n<p><strong>New features:<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/www.apple.com\/newsroom\/2022\/12\/apple-introduces-apple-music-sing\/\" target=\"_blank\" rel=\"noopener\">Apple Music Sing<\/a>, a new way to sing along with millions of your favorite songs in Apple Music, with fully adjustable vocals and newly enhanced beat-by-beat lyrics<\/li>\n<li>Freeform, the app mentioned above as part of the macOS Ventura update, is also available for iOS and iPadOS<\/li>\n<li>Advanced Data Protection for iCloud is now an opt-in setting for your Apple ID, as mentioned above<\/li>\n<li>New lock screen settings allow you to hide wallpaper or notifications when Always-On display is enabled on iPhone 14 Pro and iPhone 14 Pro Max and introduces new widgets<\/li>\n<li>SharePlay support in Game Center and a new Activity widget<\/li>\n<li>Live Activities for Apple TV app<\/li>\n<li>Improved reliability and efficiency of communication between your smart home accessories and Apple devices<\/li>\n<\/ul>\n<p><strong>Enterprise:<\/strong><br \/>\nEnterprise users receive MDM improvements and bug fixes for Siri as well as 802.1X issues. For the full details, <a href=\"https:\/\/support.apple.com\/en-is\/HT213470\" target=\"_blank\" rel=\"noopener\">have a look here<\/a>.<\/p>\n<p><strong>Improvements and bug fixes:<\/strong><\/p>\n<ul>\n<li class=\"bullet\">Improved search in Messages, Participant Cursors in Notes, and a fix for an issue that causes some notes not to sync with iCloud, are all addressed as with macOS Ventura 13.1<\/li>\n<li class=\"bullet\">Reload and Show IP Address setting enables iCloud Private Relay users to temporarily disable the service for a specific site in Safari<\/li>\n<li class=\"bullet\">News articles in Weather display information relevant to the weather in that location<\/li>\n<li class=\"bullet\">AirDrop now automatically reverts to Contacts Only after 10 minutes to prevent unwanted requests to receive content<\/li>\n<li class=\"bullet\">Crash Detection optimizations on iPhone 14 and iPhone 14 Pro models<\/li>\n<\/ul>\n<p><strong>Security-related fixes and updates:<\/strong><br \/>\nAt least 35 vulnerabilities were addressed in this update. Here are a few notable ones that are not already covered in the macOS updates:<\/p>\n<blockquote><p><strong>AppleAVD<br \/>\n<\/strong>Impact: Parsing a maliciously crafted video file may lead to kernel code execution<br \/>\nDescription: An out-of-bounds write issue was addressed with improved input validation.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Graphics Driver<br \/>\n<\/strong>Impact: Parsing a maliciously crafted video file may lead to unexpected system termination<br \/>\nDescription: The issue was addressed with improved memory handling.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>iTunes Store<br \/>\n<\/strong>Impact: A remote user may be able to cause unexpected app termination or arbitrary code execution<br \/>\nDescription: An issue existed in the parsing of URLs. This issue was addressed with improved input validation.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Weather<br \/>\n<\/strong>Impact: An app may be able to read sensitive location information<br \/>\nDescription: The issue was addressed with improved handling of caches.<\/p><\/blockquote>\n<p>The full list of security issues that were addressed can be found <a href=\"https:\/\/support.apple.com\/en-us\/HT213530\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>. To get your hands on this latest update, connect your device to your Mac and follow the update prompts. You can also download these updates over the air by going to <strong>Settings<\/strong> &gt; <strong>General<\/strong> &gt; <strong>Software Update<\/strong> on your device.<a name=\"15\"><\/a><\/p>\n<h3>iOS 15.7.2 and iPadOS 15.7.2<\/h3>\n<p><strong>Available for:<\/strong><br \/>\niPhone 6s (all models), iPhone 7 (all models), iPhone SE (1st generation), iPad Pro (all models), iPad Air 2 and later, iPad 5th generation and later, iPad mini 4 and later, and iPod touch (7th generation)<\/p>\n<p><strong>Security-related fixes and updates:<\/strong><br \/>\nAt least 17 vulnerabilities were addressed in this update, most of which were included in iOS\/iPadOS 16.2. The full list of security issues that were addressed can be found <a href=\"https:\/\/support.apple.com\/en-us\/HT213531\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/p>\n<p>To get this latest update, connect your device to your Mac and follow the update prompts. You can also download these updates over the air by going to <strong>Settings<\/strong> &gt; <strong>General<\/strong> &gt; <strong>Software Update<\/strong> on your device.<a name=\"12\"><\/a><\/p>\n<h3>iOS 12: No security updates<\/h3>\n<p>Not surprisingly, iOS 12 did not receive a security update today.<\/p>\n<p>We <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-ios-12-5-6-for-old-iphone-ipad-ipod-touch-models-to-fix-actively-exploited-vulnerability\/\">mentioned back in August<\/a> that it wasn&#8217;t yet clear whether old devices stuck on iOS 12 would continue to get security updates after the release of iOS 16 and iPadOS 16. Apple never responded to our inquiries, but the lack of iOS 12 updates since the release of iOS 16 in September\u2014during which time several actively exploited vulnerabilities have evidently remained unpatched on iOS 12\u2014seems to be our answer.<\/p>\n<p>If you still use a device that cannot be upgraded to iOS 16 (for example, an iPhone 6 which is stuck with iOS 12, or an iPhone 6s which is stuck with iOS 15), from a security perspective it&#8217;s best to replace the hardware as soon as practical.<a name=\"wat\"><\/a><\/p>\n<h3>watchOS 9.2<\/h3>\n<p><strong>Available for:<\/strong><br \/>\nApple Watch Series 4 and later<\/p>\n<p><strong>New features:<br \/>\n<\/strong><\/p>\n<ul>\n<li>Outdoor Run workout now automatically detects when you arrive at a running track and provides track specific metrics (United States only)<\/li>\n<li>Race Route lets you compete against your previous performance in Outdoor Run, Outdoor Cycle, and Outdoor Wheelchair Workouts<\/li>\n<li>New custom Kickboxing algorithm in the Workout app for more accurate metrics<\/li>\n<li>Noise app displaying when environmental sound levels are reduced now available with AirPods Pro (1st generation) and Airpods Max when using active noise cancellation<\/li>\n<li>Family Setup users can be invited to the Home app to control HomePod speakers and smart home accessories, and unlock doors with home keys in Wallet<\/li>\n<li>Accessibility support to visualize when Siren is in use on Apple Watch Ultra<\/li>\n<\/ul>\n<p><strong>Improvements and bug fixes:<br \/>\n<\/strong><\/p>\n<ul>\n<li>Improved response time and accuracy of hand gesture controls for AssistiveTouch and Quick Actions<\/li>\n<li>Crash Detection optimizations on Apple Watch Ultra, Apple Watch Series 8, and Apple Watch SE (2nd generation)<\/li>\n<li>Fix for bug that causes display of incorrect watch time immediately after dismissing an alarm in Sleep Focus<\/li>\n<li>Fix for bug causing interruptions to mindfulness sessions<\/li>\n<\/ul>\n<p><strong>Security-related fixes and updates:<br \/>\n<\/strong>At least 25 vulnerabilities were addressed in this update, all of which were included in iOS\/iPadOS 16.2.<\/p>\n<p>To install this update, make sure your iPhone is up to date first, both your phone and watch are connected to the same Wi-Fi network, and the watch has at least a 50% charge. Then open the Watch app on your phone and tap <strong>General<\/strong> &gt; <strong>Software Update<\/strong>.<a name=\"8\"><\/a><\/p>\n<h3>watchOS 8: No security updates<\/h3>\n<p>The Apple Watch Series 3 is incompatible with watchOS 9. Apple <a href=\"https:\/\/web.archive.org\/web\/20220907001204\/https:\/\/www.apple.com\/watch\/\" target=\"_blank\" rel=\"noopener\">was still selling new Series 3 units in its online store<\/a> until the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-introduces-iphone-14-apple-watch-8-and-new-airpods\/\">Series 8 and Ultra models were announced<\/a> on September 7. To this day, more than three months since the release of watchOS 9, Apple continues to sell refurbished Series 3 Apple Watch units online. Meanwhile, exactly zero watchOS 8 updates have been made available for this model.<\/p>\n<p>Simultaneous updates for watchOS versions would not be unprecedented. As recently as late 2020, Apple released simultaneous updates for <a href=\"https:\/\/support.apple.com\/en-us\/HT201222\" target=\"_blank\" rel=\"noopener\">two or three watchOS versions at a time<\/a>, mainly to support older Apple Watch models.<\/p>\n<p>Intego inquired of Apple back in October whether security updates for the Series 3 were forthcoming, but we never received any response. We followed up with Apple again today. If Apple responds, this article will be updated accordingly.<a name=\"tv\"><\/a><\/p>\n<h3>tvOS 16.2<\/h3>\n<div>\n<p><strong>Available for:<\/strong><br \/>\nApple TV 4K (all generations), and Apple TV HD (aka 4th generation)<\/p>\n<p><strong>New features:<br \/>\n<\/strong><\/p>\n<p>Siri<\/p>\n<ul>\n<li>Get personalized recommendations, play your favorite music, and more at any time with Recognize My Voice support for up to six different family members. Try &#8220;What should I watch?\u201d &#8220;Play my music,\u201d or \u201cSwitch to my profile.&#8221;<\/li>\n<li>Set your Siri language to be different from the one your Apple TV displays. Go to Settings &gt; General &gt; Siri Language.<\/li>\n<li>Now includes language support for Danish in Denmark, French and German in Luxembourg, and English in Singapore to help you find shows, music, and more using just your voice.<\/li>\n<\/ul>\n<p>Apple Music<\/p>\n<ul>\n<li>Sing along to your favorites with beat-by-beat, real-time lyrics.<\/li>\n<li>Control the vocal volume on millions of songs with Apple TV 4K (3rd generation).<\/li>\n<\/ul>\n<p><strong>Security-related fixes and updates:<br \/>\n<\/strong>At least 28 vulnerabilities were addressed in this update, all of which were covered in iOS\/iPadOS 16.2, with one addition: the &#8220;actively exploited&#8221; WebKit vulnerability that was previously fixed in iOS 16.1.2.<a name=\"hom\"><\/a><\/p>\n<h3>audioOS 16.2<\/h3>\n<p>Apple&#8217;s rarely-mentioned audioOS (also known as HomePod Software, or HomePodOS) for HomePod mini also received an update. Apple has never mentioned this operating system on its <a href=\"https:\/\/support.apple.com\/en-us\/HT201222\" target=\"_blank\" rel=\"noopener\">security updates page<\/a>, so it is unclear whether any security issues were addressed in this week&#8217;s update.<\/p>\n<p>HomePod updates are generally not urgent, and they are supposed to install automatically. However, if you would like to update your HomePod or HomePod mini&#8217;s operating system manually, you can go into the <strong>Home<\/strong> app on your iPhone or iPad, then tap the\u00a0<strong>House icon<\/strong> &gt; <strong>Home Settings<\/strong> &gt;<strong> Software Update<\/strong> &gt; temporarily disable (toggle off) <strong>Install Updates Automatically<\/strong> &gt; then tap <strong>Install<\/strong>. After updating, remember to <strong>re-enable the Install Updates Automatically<\/strong> setting.<a name=\"keys\"><\/a><\/p>\n<h3>Key takeaways<\/h3>\n<p>Whenever an Apple update addresses an &#8220;actively exploited&#8221; security issue, it is important to install the update as soon as you can. Thus, <strong>you should definitely prioritize installing this week&#8217;s macOS Ventura, iOS, and iPadOS updates.<\/strong><\/p>\n<p>If you have a Mac running Monterey or Big Sur that&#8217;s compatible with Ventura, you may wish to update to the new Monterey or Big Sur version, and then as soon as practical, upgrade to macOS Ventura. <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-potentially-make-users-security-and-privacy-precarious\/\">Here&#8217;s why.<\/a> Generally speaking, it is best to update to the latest Apple OS versions quickly for security reasons. For maximum security, one cannot rely on any minimal security patches Apple may release for previous OS versions.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"nXEyjI6SkC\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-potentially-make-users-security-and-privacy-precarious\/\">Apple&#8217;s Poor Patching Policies Potentially Make Users&#8217; Security and Privacy Precarious<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Apple&#8217;s Poor Patching Policies Potentially Make Users&#8217; Security and Privacy Precarious&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-potentially-make-users-security-and-privacy-precarious\/embed\/#?secret=nXEyjI6SkC\" data-secret=\"nXEyjI6SkC\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>Whenever you&#8217;re preparing to update iOS, iPadOS, or macOS, always back up your data before installing any updates. This gives you a restore point if something does not go as planned.<\/p>\n<p>See also our related article on <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-verify-your-backups-are-working-properly\/\">checking your macOS backups<\/a>:<a name=\"learnmore\"><\/a><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"mT4trrSSis\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-verify-your-backups-are-working-properly\/\">How to Verify Your Backups are Working Properly<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;How to Verify Your Backups are Working Properly&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-verify-your-backups-are-working-properly\/embed\/#?secret=mT4trrSSis\" data-secret=\"mT4trrSSis\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<h3>How can I learn more?<\/h3>\n<p>For additional details about the Gatekeeper bypass vulnerability, as well as several additional vulnerabilities that Apple didn&#8217;t mention on December 13 and added to the release notes on December 22, see our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/microsoft-discovers-new-gatekeeper-bypass-apple-updates-past-security-advisories\/\">follow-up article<\/a>.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"lVCpdukPLY\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/microsoft-discovers-new-gatekeeper-bypass-apple-updates-past-security-advisories\/\">Microsoft discovers new Gatekeeper bypass; Apple updates past security advisories<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Microsoft discovers new Gatekeeper bypass; Apple updates past security advisories&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/microsoft-discovers-new-gatekeeper-bypass-apple-updates-past-security-advisories\/embed\/#?secret=lVCpdukPLY\" data-secret=\"lVCpdukPLY\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>We talked about Apple&#8217;s latest operating system updates on <a href=\"https:\/\/podcast.intego.com\/270\">episode 270<\/a>:<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/player.fireside.fm\/v2\/GegHgcrH+hM-4O3tF?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Twitter-logo-icon-64.png\" alt=\"Follow Intego on Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Facebook-logo-icon-64.png\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/YouTube-logo-icon-64.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Pinterest-logo-icon-64.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/LinkedIn-logo-icon-64.png\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Instagram-logo-icon-64.png\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>This week, Apple released updates for all of its operating systems. A vulnerability that was actively exploited on iOS has been patched for some, but apparently not all, OSes.<\/p>\n","protected":false},"author":79,"featured_media":85426,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13,5],"tags":[24,2197,69,4186,4627,4645,4564,4644,3175,4589,4618,4643,115,201,4583],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"This week, Apple released updates for all of its operating systems. A vulnerability that was actively exploited on iOS has been patched for some, but apparently not all, OSes.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-ventura-13-1-ios-16-2-and-more-fixes-zero-day-vuln\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple releases macOS Ventura 13.1, iOS 16.2, and more; fixes zero-day vuln - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"This week, Apple released updates for all of its operating systems. A vulnerability that was actively exploited on iOS has been patched for some, but apparently not all, OSes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-ventura-13-1-ios-16-2-and-more-fixes-zero-day-vuln\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-15T07:27:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-23T06:26:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/ios-software-update-available-icon-400x260.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jay Vrijenhoek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"15 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-ventura-13-1-ios-16-2-and-more-fixes-zero-day-vuln\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/ios-software-update-available-icon-400x260.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/ios-software-update-available-icon-400x260.png\",\"width\":400,\"height\":260,\"caption\":\"iOS software update available icon\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-ventura-13-1-ios-16-2-and-more-fixes-zero-day-vuln\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-ventura-13-1-ios-16-2-and-more-fixes-zero-day-vuln\/\",\"name\":\"Apple releases macOS Ventura 13.1, iOS 16.2, and more; fixes zero-day vuln - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-ventura-13-1-ios-16-2-and-more-fixes-zero-day-vuln\/#primaryimage\"},\"datePublished\":\"2022-12-15T07:27:22+00:00\",\"dateModified\":\"2022-12-23T06:26:11+00:00\",\"description\":\"This week, Apple released updates for all of its operating systems. A vulnerability that was actively exploited on iOS has been patched for some, but apparently not all, OSes.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-ventura-13-1-ios-16-2-and-more-fixes-zero-day-vuln\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-ventura-13-1-ios-16-2-and-more-fixes-zero-day-vuln\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-ventura-13-1-ios-16-2-and-more-fixes-zero-day-vuln\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple releases macOS Ventura 13.1, iOS 16.2, and more; fixes zero-day vuln\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-ventura-13-1-ios-16-2-and-more-fixes-zero-day-vuln\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-ventura-13-1-ios-16-2-and-more-fixes-zero-day-vuln\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\"},\"headline\":\"Apple releases macOS Ventura 13.1, iOS 16.2, and more; fixes zero-day vuln\",\"datePublished\":\"2022-12-15T07:27:22+00:00\",\"dateModified\":\"2022-12-23T06:26:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-ventura-13-1-ios-16-2-and-more-fixes-zero-day-vuln\/#webpage\"},\"wordCount\":2894,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-ventura-13-1-ios-16-2-and-more-fixes-zero-day-vuln\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/ios-software-update-available-icon-400x260.png\",\"keywords\":[\"Apple TV\",\"Apple Watch\",\"iOS\",\"iOS 12\",\"iOS 15\",\"iOS 16\",\"iPadOS\",\"iPadOS 16\",\"macOS\",\"macOS Big Sur\",\"macOS Monterey\",\"macOS Ventura\",\"Safari\",\"Security Updates\",\"watchOS\"],\"articleSection\":[\"Security &amp; Privacy\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-ventura-13-1-ios-16-2-and-more-fixes-zero-day-vuln\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\",\"name\":\"Jay Vrijenhoek\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"caption\":\"Jay Vrijenhoek\"},\"description\":\"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"This week, Apple released updates for all of its operating systems. A vulnerability that was actively exploited on iOS has been patched for some, but apparently not all, OSes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-ventura-13-1-ios-16-2-and-more-fixes-zero-day-vuln\/","og_locale":"en_US","og_type":"article","og_title":"Apple releases macOS Ventura 13.1, iOS 16.2, and more; fixes zero-day vuln - The Mac Security Blog","og_description":"This week, Apple released updates for all of its operating systems. A vulnerability that was actively exploited on iOS has been patched for some, but apparently not all, OSes.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-ventura-13-1-ios-16-2-and-more-fixes-zero-day-vuln\/","og_site_name":"The Mac Security Blog","article_published_time":"2022-12-15T07:27:22+00:00","article_modified_time":"2022-12-23T06:26:11+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/ios-software-update-available-icon-400x260.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jay Vrijenhoek","Est. reading time":"15 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-ventura-13-1-ios-16-2-and-more-fixes-zero-day-vuln\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/ios-software-update-available-icon-400x260.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/ios-software-update-available-icon-400x260.png","width":400,"height":260,"caption":"iOS software update available icon"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-ventura-13-1-ios-16-2-and-more-fixes-zero-day-vuln\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-ventura-13-1-ios-16-2-and-more-fixes-zero-day-vuln\/","name":"Apple releases macOS Ventura 13.1, iOS 16.2, and more; fixes zero-day vuln - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-ventura-13-1-ios-16-2-and-more-fixes-zero-day-vuln\/#primaryimage"},"datePublished":"2022-12-15T07:27:22+00:00","dateModified":"2022-12-23T06:26:11+00:00","description":"This week, Apple released updates for all of its operating systems. A vulnerability that was actively exploited on iOS has been patched for some, but apparently not all, OSes.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-ventura-13-1-ios-16-2-and-more-fixes-zero-day-vuln\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-ventura-13-1-ios-16-2-and-more-fixes-zero-day-vuln\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-ventura-13-1-ios-16-2-and-more-fixes-zero-day-vuln\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Apple releases macOS Ventura 13.1, iOS 16.2, and more; fixes zero-day vuln"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-ventura-13-1-ios-16-2-and-more-fixes-zero-day-vuln\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-ventura-13-1-ios-16-2-and-more-fixes-zero-day-vuln\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0"},"headline":"Apple releases macOS Ventura 13.1, iOS 16.2, and more; fixes zero-day vuln","datePublished":"2022-12-15T07:27:22+00:00","dateModified":"2022-12-23T06:26:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-ventura-13-1-ios-16-2-and-more-fixes-zero-day-vuln\/#webpage"},"wordCount":2894,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-ventura-13-1-ios-16-2-and-more-fixes-zero-day-vuln\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/ios-software-update-available-icon-400x260.png","keywords":["Apple TV","Apple Watch","iOS","iOS 12","iOS 15","iOS 16","iPadOS","iPadOS 16","macOS","macOS Big Sur","macOS Monterey","macOS Ventura","Safari","Security Updates","watchOS"],"articleSection":["Security &amp; Privacy","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-ventura-13-1-ios-16-2-and-more-fixes-zero-day-vuln\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0","name":"Jay Vrijenhoek","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","caption":"Jay Vrijenhoek"},"description":"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.","url":"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/ios-software-update-available-icon-400x260.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-p9t","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/96687"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/79"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=96687"}],"version-history":[{"count":16,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/96687\/revisions"}],"predecessor-version":[{"id":97617,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/96687\/revisions\/97617"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/85426"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=96687"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=96687"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=96687"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}