{"id":97187,"date":"2023-02-15T07:55:12","date_gmt":"2023-02-15T15:55:12","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=97187"},"modified":"2023-04-07T05:33:06","modified_gmt":"2023-04-07T12:33:06","slug":"apple-issues-macos-ventura-13-2-1-ios-16-3-1-to-fix-zero-day-vulnerability","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/apple-issues-macos-ventura-13-2-1-ios-16-3-1-to-fix-zero-day-vulnerability\/","title":{"rendered":"Update Now: Urgent fix for macOS Ventura 13.2.1, iOS 16.3.1 resolves major vulnerability"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"size-full wp-image-97208 aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-600x300-1.png\" alt=\"\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-600x300-1.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-600x300-1-300x150.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-600x300-1-150x75.png 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>On Monday, Apple released security updates for its operating systems, primarily to address an &#8220;actively exploited&#8221; (i.e. zero-day, in-the-wild) vulnerability. These updates included macOS Ventura 13.2.1, iOS and iPadOS 16.3.1, and more.<\/p>\n<p>In this article, we&#8217;ll examine what we know about the vulnerabilities that Apple mitigated, and why it&#8217;s important to update quickly.<\/p>\n<p><strong>Update:<\/strong> Apple released macOS Big Sur 11.7.4 on Wednesday, noting that &#8220;This update has no published CVE entries.&#8221; A new section with additional details has been added below.<\/p>\n<p>In this article:<\/p>\n<ul>\n<li><a href=\"#0d\">Apple addresses zero-day vulnerability<\/a><\/li>\n<li><a href=\"#vent\">macOS Ventura 13.2.1<\/a><\/li>\n<li><a href=\"#mont\">macOS Monterey \u2014 no security updates yet (except Safari)<\/a><\/li>\n<li><a href=\"#bs\">macOS Big Sur 11.7.4<\/a><\/li>\n<li><a href=\"#saf\">Safari 16.3.1 for macOS Monterey and Big Sur<\/a><\/li>\n<li><a href=\"#16\">iOS 16.3.1 and iPadOS 16.3.1<\/a><\/li>\n<li><a href=\"#15\">iOS 15 and iPadOS 15 \u2014 no security updates yet<\/a><\/li>\n<li><a href=\"#wat\">watchOS 9.3.1<\/a><\/li>\n<li><a href=\"#8\">watchOS 8 \u2014 still no security updates for seven months<\/a><\/li>\n<li><a href=\"#tv\">tvOS 16.3.2<\/a><\/li>\n<li><a href=\"#keys\">Key takeaways<\/a><\/li>\n<li><a href=\"#learnmore\">How can I learn more?<\/a><a name=\"0d\"><\/a><\/li>\n<\/ul>\n<h3>Apple addresses zero-day vulnerability<\/h3>\n<p>First let&#8217;s take a look at the zero-day vulnerability that Apple addressed for multiple operating systems. Apple says of the update:<\/p>\n<blockquote><p><strong>WebKit<br \/>\n<\/strong>Impact: Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.<br \/>\nDescription: A type confusion issue was addressed with improved checks.<br \/>\nWebKit Bugzilla: 251944<br \/>\nCVE-2023-23529: an anonymous researcher<\/p><\/blockquote>\n<p>The vulnerability was mitigated in macOS Ventura 13.2.1, iOS 16.3.1, iPadOS 16.3.1, and Safari 16.3.1 for macOS Monterey and macOS Big Sur.<\/p>\n<p>Notably, Apple has not yet released a corresponding patch for iOS 15 or iPadOS 15. This is significant, because many people still use iPhones and iPads that cannot be upgraded to iOS 16 or iPadOS 16. Additionally, the iPod touch (7th generation), which had just barely been discontinued in May 2022 before iOS 16 was announced in June, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apples-planned-obsolescence\/\">cannot be upgraded to iOS 16<\/a>, either.<\/p>\n<p>Although Apple also patched vulnerabilities in tvOS 16 and watchOS 9 this week, Apple has yet to release the details about what was patched in those updates, so it is not yet clear whether those operating systems were affected or received patches for this WebKit vulnerability.<\/p>\n<p>Little information is publicly available about the vulnerability. The <a href=\"https:\/\/bugs.webkit.org\/show_bug.cgi?id=251944\" target=\"_blank\" rel=\"noopener\">WebKit Bugzilla issue<\/a> only allows &#8220;authorized&#8221; users to access it and see the details. So far, <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-23529\" target=\"_blank\" rel=\"noopener\">MITRE<\/a> and <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-23529\" target=\"_blank\" rel=\"noopener\">NIST<\/a> have not published any details about the CVE. Given that the vulnerability was reported anonymously, and that Apple acknowledged The Citizen Lab in its iOS update details, there is some speculation within the security community that this vulnerability may have been used by <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/pegasus\/\">Pegasus<\/a> or other commercial spyware often used by governments and law enforcement agencies. However, this possible connection has not been confirmed.<\/p>\n<p>Intego has reached out to Apple to inquire whether the vulnerability impacts tvOS, watchOS, or previous versions of iOS and iPadOS. Based on Apple&#8217;s track record, we do not anticipate that Apple will respond to our (or any journalist&#8217;s) inquiries about this matter.<\/p>\n<p>Before this week, the most recent &#8220;actively exploited&#8221; vulnerability that Apple patched was a similar-sounding WebKit issue, also related to the processing of &#8220;maliciously crafted web content.&#8221; Apple <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-ventura-13-1-ios-16-2-and-more-fixes-zero-day-vuln\/\">patched that vulnerability<\/a>, CVE-2022-42856, on December 13, 2022 for macOS Ventura, Monterey, and Big Sur, for iOS and iPadOS 16 and 15, and for tvOS 16. Notably, the patch was not among those listed in watchOS 9.2&#8217;s security release notes; Apple never confirmed to Intego whether the vulnerability impacted watchOS. Apple later <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-ventura-13-2-ios-16-3-and-more\/\">patched the same vulnerability for iOS 12<\/a> on January 23, 2023.<a name=\"vent\"><\/a><\/p>\n<h3>macOS Ventura 13.2.1<\/h3>\n<p><strong>Available for:<\/strong><br \/>\nAll supported Macs currently running macOS Ventura<\/p>\n<p><strong>Security updates:<\/strong><br \/>\nAt least three vulnerabilities were addressed in this update. Apple&#8217;s page with <a href=\"https:\/\/support.apple.com\/en-us\/HT213633\" target=\"_blank\" rel=\"noopener\">macOS Ventura 13.2.1&#8217;s security details<\/a> currently mentions the WebKit vulnerability detailed above, and two others:<\/p>\n<blockquote><p><strong>Kernel<br \/>\n<\/strong>Impact: An app may be able to execute arbitrary code with kernel privileges<br \/>\nDescription: A use after free issue was addressed with improved memory management.<br \/>\nCVE-2023-23514: Xinru Chi of Pangu Lab, Ned Williamson of Google Project Zero<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Shortcuts<br \/>\n<\/strong>Impact: An app may be able to observe unprotected user data<br \/>\nDescription: A privacy issue was addressed with improved handling of temporary files.<br \/>\nCVE-2023-23522: Wenchao Li and Xiaolong Bai of Alibaba Group<\/p><\/blockquote>\n<p>Users of macOS Ventura can get this update by going to <strong>System Settings<\/strong> &gt; <strong>General<\/strong> &gt; <strong>Software Update<\/strong>.<\/p>\n<p>If your Mac is running macOS Mojave, Catalina, Big Sur, or Monterey, and your Mac is compatible with macOS Ventura, you can upgrade to macOS Ventura by going to <strong>System Preferences<\/strong> &gt; <strong>Software Update<\/strong>. If your Mac is running macOS High Sierra or older and is compatible with macOS Ventura, look for macOS Ventura in the App Store and download it from there.<a name=\"mont\"><\/a><\/p>\n<h3>macOS Monterey \u2014 no security updates yet<\/h3>\n<p>Apple has not yet released any security updates specifically for macOS Monterey this week, other than a separate Safari update (detailed below) that addresses the aforementioned WebKit vulnerability.<\/p>\n<p>As a reminder, Apple is no longer patching every security vulnerability that affects macOS Monterey. Apple&#8217;s policy is that &#8220;<a href=\"https:\/\/support.apple.com\/guide\/deployment\/about-software-updates-depc4c80847a\/web#:~:text=not%20all%20known%20security%20issues%20are%20addressed%20in%20previous%20versions\" target=\"_blank\" rel=\"noopener\">not all known security issues are addressed in previous versions<\/a>.&#8221; We advise users to upgrade to macOS Ventura if your Mac supports it\u2014or even <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-keep-older-macs-secure-a-geeky-approach\/\">on an unsupported Mac<\/a>, at your own risk.<a name=\"bs\"><\/a><\/p>\n<h3>macOS Big Sur 11.7.4<\/h3>\n<p><strong>Available for:<\/strong><br \/>\nAll Macs currently running macOS Big Sur<\/p>\n<p><strong>Improvements and bug fixes:<br \/>\n<\/strong>According to <a href=\"https:\/\/www.macrumors.com\/2023\/02\/15\/apple-releases-macos-big-sur-11-7-4\/\" target=\"_blank\" rel=\"noopener\">MacRumors<\/a>, the Big Sur update &#8220;addresses an ongoing issue with Safari [Favorites] icons.&#8221; Apple had not yet published details about the update on its <a href=\"https:\/\/support.apple.com\/en-us\/HT211896\" target=\"_blank\" rel=\"noopener\">What&#8217;s new in the updates for macOS Big Sur<\/a> support page at the time we last updated this article. However, the Safari icon issue is not mentioned in the Apple Software Update description of the patch.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">macOS Big Sur 11.7.4 (20G1120) update is live \ud83d\udc47 <a href=\"https:\/\/t.co\/L7gtcH2tM8\">pic.twitter.com\/L7gtcH2tM8<\/a><\/p>\n<p>&mdash; Mr. Macintosh (@ClassicII_MrMac) <a href=\"https:\/\/twitter.com\/ClassicII_MrMac\/status\/1625973901359546374?ref_src=twsrc%5Etfw\">February 15, 2023<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p><strong>Security updates:<\/strong><br \/>\nApple Software Update claims that &#8220;This update provides important security fixes and is recommended for all users.&#8221; However, the <a href=\"https:\/\/support.apple.com\/en-us\/HT201222\" target=\"_blank\" rel=\"noopener\">Apple security updates<\/a> support page only states that &#8220;This update has no published CVE entries.&#8221;<\/p>\n<p>This is not necessarily a contradiction; it&#8217;s possible that Apple may have addressed security issues for which no CVE number has been assigned. However, the lack of a corresponding security update for macOS Monterey\u2014the operating system that came in between Big Sur and Ventura\u2014certainly seems odd.<\/p>\n<p>The WebKit vulnerability was addressed in a separate Safari update for macOS Big Sur users (see below).<\/p>\n<p>If you have a Mac running macOS Big Sur, you can get this update by going to <strong>System Preferences<\/strong> &gt; <strong>Software Update<\/strong>.<\/p>\n<p>As a reminder, Apple is no longer patching every security vulnerability that affects macOS Big Sur. Apple&#8217;s policy is that &#8220;<a href=\"https:\/\/support.apple.com\/guide\/deployment\/about-software-updates-depc4c80847a\/web#:~:text=not%20all%20known%20security%20issues%20are%20addressed%20in%20previous%20versions\" target=\"_blank\" rel=\"noopener\">not all known security issues are addressed in previous versions<\/a>.&#8221; We advise users to upgrade to macOS Ventura if your Mac supports it\u2014or even <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-keep-older-macs-secure-a-geeky-approach\/\">on an unsupported Mac<\/a>, at your own risk.<a name=\"saf\"><\/a><\/p>\n<h3>Safari 16.3.1 for macOS Monterey and Big Sur<\/h3>\n<p><strong>Available for:<\/strong><br \/>\nmacOS Monterey and macOS Big Sur<\/p>\n<p>As of today, Apple only mentions the single WebKit issue mentioned above in its <a href=\"https:\/\/support.apple.com\/en-us\/HT213638\" target=\"_blank\" rel=\"noopener\">list of fixes for Safari 16.3.1<\/a>.<\/p>\n<p>Notably, Apple mistakenly re-released this patch as Safari 16.3 in Software Update. If you&#8217;re running macOS Monterey or Big Sur, you can confirm whether you have the latest version by opening Safari, clicking on the <strong>Safari<\/strong> menu next to the Apple menu, then clicking on\u00a0<strong>About Safari<\/strong>. After installing this patch, the version will be listed as &#8220;Version 16.3 (177614.4.6.11.6)&#8221; if your Mac is running Monterey, or &#8220;Version 16.3 (167614.4.6.11.6)&#8221; if your Mac is running Big Sur.<\/p>\n<p>The\u00a0update is available in <strong>System Preferences<\/strong> &gt;<strong> Software Update<\/strong> on your Mac.<a name=\"16\"><\/a><\/p>\n<h3>iOS 16.3.1 and iPadOS 16.3.1<\/h3>\n<p><strong>Available for:<\/strong><br \/>\niPhone 8 and later, iPad Pro (all models), iPad Air 3rd generation and later, iPad 5th generation and later, and iPad mini 5th generation and later<\/p>\n<p><strong>Security updates:<\/strong><br \/>\nAt least two vulnerabilities were addressed in this update: the WebKit and Kernel vulnerabilities listed above. Apple also acknowledged &#8220;The Citizen Lab at The University of Toronto\u2019s Munk School for their assistance&#8221; with unspecified security issues.<\/p>\n<p>The full list of security issues that were addressed can be found <a href=\"https:\/\/support.apple.com\/en-us\/HT213635\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>. To get the update over the air, go to <strong>Settings<\/strong> &gt; <strong>General<\/strong> &gt; <strong>Software Update<\/strong> on your device.<a name=\"15\"><\/a><\/p>\n<h3>iOS 15 and iPadOS 15 \u2014 no security updates yet<\/h3>\n<p>In recent years, Apple has released patches for &#8220;actively exploited&#8221; vulnerabilities for previous versions of iOS, specifically for hardware that cannot support the current operating system. However, Apple sometimes waits days, weeks, or even months before patching previous OS versions.<\/p>\n<p>So far, Apple has not yet released a corresponding patch for iOS 15 or iPadOS 15 to address the actively exploited WebKit vulnerability. Those who still use devices that <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apples-planned-obsolescence\/\">cannot be upgraded to iOS 16 or iPadOS 16<\/a>, including the iPod touch (7th generation), presumably remain vulnerable for the time being. Intego has reached out to Apple to confirm whether the WebKit vulnerability impacts previous versions of iOS and iPadOS, and when we can expect a patch.\u00a0<strong>Update:<\/strong> Apple finally patched this vulnerability more than a month later, in iOS and iPadOS 15.7.4.<a name=\"wat\"><\/a><\/p>\n<h3>watchOS 9.3.1<\/h3>\n<p><strong>Available for:<\/strong><br \/>\nApple Watch Series 4 and later<\/p>\n<p><strong>Security updates:<br \/>\n<\/strong>Apple released watchOS 9.3.1 on Monday, but so far the company has not released any details about which security vulnerabilities it addresses. For now, the <a href=\"https:\/\/support.apple.com\/en-us\/HT201222\" target=\"_blank\" rel=\"noopener\">Apple security updates<\/a> page simply says, &#8220;details available soon.&#8221;<\/p>\n<p>To install this update, make sure your iPhone is up to date first, both your phone and watch are connected to the same Wi-Fi network, and the watch has at least a 50% charge. Then open the Watch app on your phone and tap <strong>General<\/strong> &gt; <strong>Software Update<\/strong>.<a name=\"8\"><\/a><\/p>\n<h3>watchOS 8 \u2014 still no security updates for seven months<\/h3>\n<p>Meanwhile, there&#8217;s still no word on when (or if) Apple Watch Series 3\u2014<a href=\"https:\/\/www.apple.com\/shop\/refurbished\/watch\/apple-watch-series-3\" target=\"_blank\" rel=\"noopener\">which Apple still sells refurbished<\/a>\u2014will get watchOS 8 security updates. Apple has, for unknown reasons, chosen not to release watchOS 9 for this model, putting the device in an awkward state of limbo.<\/p>\n<p>The most recent security update for watchOS 8 was in July 2022, about two months before watchOS 9 came out. That means <strong>it has been nearly seven months since the Apple Watch Series 3 has gotten any security updates.<\/strong><\/p>\n<p>As we&#8217;ve mentioned previously, simultaneous updates for watchOS versions would not be unprecedented. As recently as late 2020, Apple released simultaneous updates for <a href=\"https:\/\/support.apple.com\/en-us\/HT201222\" target=\"_blank\" rel=\"noopener\">two or three watchOS versions at a time<\/a>, mainly to support older Apple Watch models.<\/p>\n<p>It&#8217;s hard to understand how Apple can justify such seemingly negligent behavior regarding any product that it&#8217;s still selling.<\/p>\n<p>Intego has asked Apple multiple times since October for an update regarding watchOS 8 security for the Apple Watch Series 3, but Apple has neglected to respond to our inquiries.<a name=\"tv\"><\/a><\/p>\n<h3>tvOS 16.3.2<\/h3>\n<div>\n<p><strong>Available for:<\/strong><br \/>\nApple TV 4K (all generations), and Apple TV HD (aka 4th generation)<\/p>\n<p><strong style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\">Security-related fixes and updates:<\/strong><\/p>\n<\/div>\n<p>Apple released tvOS 16.3.2 on Monday, but so far the company has not released any details about which security vulnerabilities it addresses. For now, the <a href=\"https:\/\/support.apple.com\/en-us\/HT201222\" target=\"_blank\" rel=\"noopener\">Apple security updates<\/a> page simply says, &#8220;details available soon.&#8221;<\/p>\n<p>This update comes just a week after tvOS 16.3.1, for which Apple has not published any security details. Apple said that tvOS 16.3.1 &#8220;has no published CVE entries,&#8221; although this does not necessarily mean that no security issues were addressed.<\/p>\n<p>The tvOS update can be downloaded directly from the Apple TV by going to <strong>Settings<\/strong> &gt; <strong>System<\/strong> &gt; <strong>Update Software<\/strong>.<a name=\"keys\"><\/a><\/p>\n<h3>Key takeaways<\/h3>\n<p>If you get nothing else out of this article, here are some key points:<\/p>\n<ul>\n<li>Apple released a bunch of updates this week, including mitigations for a vulnerability that has been actively exploited in the wild; <strong>check for and install updates on all your Apple devices!<\/strong><\/li>\n<li>At this point, <strong>macOS Ventura, iOS 16, and iPadOS 16 are the only safe operating systems<\/strong> to use on Macs, iPhones, and iPads, respectively.\n<ul>\n<li>If you have a Mac for which Apple doesn&#8217;t officially support Ventura, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-keep-older-macs-secure-a-geeky-approach\/\">you may be able to upgrade it anyway<\/a>.<\/li>\n<li>If you have an older iPhone or iPad that isn&#8217;t compatible with 16.x, or any iPod touch, buying a new device is the safest option.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Don&#8217;t buy an Apple Watch Series 3.<\/strong> Apple has not been providing security updates for it for seven months now, even though the company continues to sell it.<\/li>\n<\/ul>\n<p>It is advisable to update to the latest operating systems as soon as you reasonably can. It&#8217;s important to get the benefits of new security fixes as quickly as possible to help you stay protected.<\/p>\n<p>If you have a Mac running macOS Monterey or Big Sur that&#8217;s compatible with Ventura, you may wish to update to the new Monterey or Big Sur version, and then as soon as practical, upgrade to macOS Ventura. <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-potentially-make-users-security-and-privacy-precarious\/\">Here&#8217;s why.<\/a> Generally speaking, it is best to update to the latest Apple OS versions quickly for security reasons. For maximum security, one cannot rely on any minimal security patches Apple may release for previous OS versions.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"nvEM5htNc9\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-potentially-make-users-security-and-privacy-precarious\/\">Apple&#8217;s Poor Patching Policies Potentially Make Users&#8217; Security and Privacy Precarious<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Apple&#8217;s Poor Patching Policies Potentially Make Users&#8217; Security and Privacy Precarious&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-potentially-make-users-security-and-privacy-precarious\/embed\/#?secret=nvEM5htNc9\" data-secret=\"nvEM5htNc9\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>Whenever you&#8217;re preparing to update iOS, iPadOS, or macOS, always back up your data before installing any updates. This gives you a restore point if something does not go as planned.<\/p>\n<p>See also our related article on <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-verify-your-backups-are-working-properly\/\">checking your macOS backups<\/a>:<a name=\"learnmore\"><\/a><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"JntDhICODK\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-verify-your-backups-are-working-properly\/\">How to Verify Your Backups are Working Properly<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;How to Verify Your Backups are Working Properly&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-verify-your-backups-are-working-properly\/embed\/#?secret=JntDhICODK\" data-secret=\"JntDhICODK\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<h3>How can I learn more?<\/h3>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, including security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Twitter-logo-icon-64.png\" alt=\"Follow Intego on Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Facebook-logo-icon-64.png\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/YouTube-logo-icon-64.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Pinterest-logo-icon-64.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/LinkedIn-logo-icon-64.png\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Instagram-logo-icon-64.png\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple has released macOS Ventura 13.2.1, and iOS and iPadOS 16.3.1, to address an actively exploited (i.e. zero-day, in-the-wild) vulnerability. Here is everything you need to know to stay protected.<\/p>\n","protected":false},"author":14,"featured_media":97207,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[11],"tags":[24,2197,69,4645,4564,3175,4589,4618,4643,115,201,4583],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Apple has released macOS Ventura 13.2.1, and iOS and iPadOS 16.3.1, to address an actively exploited (i.e. zero-day, in-the-wild) vulnerability. Here is everything you need to know to stay protected.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-issues-macos-ventura-13-2-1-ios-16-3-1-to-fix-zero-day-vulnerability\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Update Now: Urgent fix for macOS Ventura 13.2.1, iOS 16.3.1 resolves major vulnerability - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Apple has released macOS Ventura 13.2.1, and iOS and iPadOS 16.3.1, to address an actively exploited (i.e. zero-day, in-the-wild) vulnerability. Here is everything you need to know to stay protected.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/apple-issues-macos-ventura-13-2-1-ios-16-3-1-to-fix-zero-day-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-15T15:55:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-07T12:33:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-400x260-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-issues-macos-ventura-13-2-1-ios-16-3-1-to-fix-zero-day-vulnerability\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-400x260-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-400x260-1.png\",\"width\":400,\"height\":260,\"caption\":\"Apple software update red critical urgent actively exploited zero-day vulnerability\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-issues-macos-ventura-13-2-1-ios-16-3-1-to-fix-zero-day-vulnerability\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-issues-macos-ventura-13-2-1-ios-16-3-1-to-fix-zero-day-vulnerability\/\",\"name\":\"Update Now: Urgent fix for macOS Ventura 13.2.1, iOS 16.3.1 resolves major vulnerability - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-issues-macos-ventura-13-2-1-ios-16-3-1-to-fix-zero-day-vulnerability\/#primaryimage\"},\"datePublished\":\"2023-02-15T15:55:12+00:00\",\"dateModified\":\"2023-04-07T12:33:06+00:00\",\"description\":\"Apple has released macOS Ventura 13.2.1, and iOS and iPadOS 16.3.1, to address an actively exploited (i.e. zero-day, in-the-wild) vulnerability. Here is everything you need to know to stay protected.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-issues-macos-ventura-13-2-1-ios-16-3-1-to-fix-zero-day-vulnerability\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-issues-macos-ventura-13-2-1-ios-16-3-1-to-fix-zero-day-vulnerability\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-issues-macos-ventura-13-2-1-ios-16-3-1-to-fix-zero-day-vulnerability\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Update Now: Urgent fix for macOS Ventura 13.2.1, iOS 16.3.1 resolves major vulnerability\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-issues-macos-ventura-13-2-1-ios-16-3-1-to-fix-zero-day-vulnerability\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-issues-macos-ventura-13-2-1-ios-16-3-1-to-fix-zero-day-vulnerability\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Update Now: Urgent fix for macOS Ventura 13.2.1, iOS 16.3.1 resolves major vulnerability\",\"datePublished\":\"2023-02-15T15:55:12+00:00\",\"dateModified\":\"2023-04-07T12:33:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-issues-macos-ventura-13-2-1-ios-16-3-1-to-fix-zero-day-vulnerability\/#webpage\"},\"wordCount\":2214,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-issues-macos-ventura-13-2-1-ios-16-3-1-to-fix-zero-day-vulnerability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-400x260-1.png\",\"keywords\":[\"Apple TV\",\"Apple Watch\",\"iOS\",\"iOS 16\",\"iPadOS\",\"macOS\",\"macOS Big Sur\",\"macOS Monterey\",\"macOS Ventura\",\"Safari\",\"Security Updates\",\"watchOS\"],\"articleSection\":[\"Software &amp; Apps\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-issues-macos-ventura-13-2-1-ios-16-3-1-to-fix-zero-day-vulnerability\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Apple has released macOS Ventura 13.2.1, and iOS and iPadOS 16.3.1, to address an actively exploited (i.e. zero-day, in-the-wild) vulnerability. Here is everything you need to know to stay protected.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/apple-issues-macos-ventura-13-2-1-ios-16-3-1-to-fix-zero-day-vulnerability\/","og_locale":"en_US","og_type":"article","og_title":"Update Now: Urgent fix for macOS Ventura 13.2.1, iOS 16.3.1 resolves major vulnerability - The Mac Security Blog","og_description":"Apple has released macOS Ventura 13.2.1, and iOS and iPadOS 16.3.1, to address an actively exploited (i.e. zero-day, in-the-wild) vulnerability. Here is everything you need to know to stay protected.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/apple-issues-macos-ventura-13-2-1-ios-16-3-1-to-fix-zero-day-vulnerability\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2023-02-15T15:55:12+00:00","article_modified_time":"2023-04-07T12:33:06+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-400x260-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-issues-macos-ventura-13-2-1-ios-16-3-1-to-fix-zero-day-vulnerability\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-400x260-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-400x260-1.png","width":400,"height":260,"caption":"Apple software update red critical urgent actively exploited zero-day vulnerability"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-issues-macos-ventura-13-2-1-ios-16-3-1-to-fix-zero-day-vulnerability\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/apple-issues-macos-ventura-13-2-1-ios-16-3-1-to-fix-zero-day-vulnerability\/","name":"Update Now: Urgent fix for macOS Ventura 13.2.1, iOS 16.3.1 resolves major vulnerability - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-issues-macos-ventura-13-2-1-ios-16-3-1-to-fix-zero-day-vulnerability\/#primaryimage"},"datePublished":"2023-02-15T15:55:12+00:00","dateModified":"2023-04-07T12:33:06+00:00","description":"Apple has released macOS Ventura 13.2.1, and iOS and iPadOS 16.3.1, to address an actively exploited (i.e. zero-day, in-the-wild) vulnerability. Here is everything you need to know to stay protected.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-issues-macos-ventura-13-2-1-ios-16-3-1-to-fix-zero-day-vulnerability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-issues-macos-ventura-13-2-1-ios-16-3-1-to-fix-zero-day-vulnerability\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-issues-macos-ventura-13-2-1-ios-16-3-1-to-fix-zero-day-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Update Now: Urgent fix for macOS Ventura 13.2.1, iOS 16.3.1 resolves major vulnerability"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-issues-macos-ventura-13-2-1-ios-16-3-1-to-fix-zero-day-vulnerability\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-issues-macos-ventura-13-2-1-ios-16-3-1-to-fix-zero-day-vulnerability\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Update Now: Urgent fix for macOS Ventura 13.2.1, iOS 16.3.1 resolves major vulnerability","datePublished":"2023-02-15T15:55:12+00:00","dateModified":"2023-04-07T12:33:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-issues-macos-ventura-13-2-1-ios-16-3-1-to-fix-zero-day-vulnerability\/#webpage"},"wordCount":2214,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-issues-macos-ventura-13-2-1-ios-16-3-1-to-fix-zero-day-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-400x260-1.png","keywords":["Apple TV","Apple Watch","iOS","iOS 16","iPadOS","macOS","macOS Big Sur","macOS Monterey","macOS Ventura","Safari","Security Updates","watchOS"],"articleSection":["Software &amp; Apps"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-issues-macos-ventura-13-2-1-ios-16-3-1-to-fix-zero-day-vulnerability\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-400x260-1.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-phx","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/97187"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=97187"}],"version-history":[{"count":14,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/97187\/revisions"}],"predecessor-version":[{"id":97619,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/97187\/revisions\/97619"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/97207"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=97187"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=97187"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=97187"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}