{"id":98014,"date":"2023-05-18T23:07:48","date_gmt":"2023-05-19T06:07:48","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=98014"},"modified":"2023-09-17T18:47:20","modified_gmt":"2023-09-18T01:47:20","slug":"urgent-patches-macos-ventura-13-4-ios-16-5-fix-3-actively-exploited-vulns","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-4-ios-16-5-fix-3-actively-exploited-vulns\/","title":{"rendered":"Urgent Patches: macOS Ventura 13.4, iOS 16.5 fix 3 actively exploited vulns"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-97208\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-600x300-1.png\" alt=\"\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-600x300-1.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-600x300-1-300x150.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-600x300-1-150x75.png 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>On Thursday, May 18, Apple released updates to all of its operating systems. The updates included new features as well as security-related fixes\u2014including for three &#8220;actively exploited&#8221; vulnerabilities.<\/p>\n<p>Let&#8217;s take a look at the highlights of each update.<\/p>\n<p><em>In this article:<\/em><\/p>\n<ul>\n<li><a href=\"#0d\">Apple addresses three zero-day vulnerabilities<\/a><\/li>\n<li><a href=\"#vent\">macOS Ventura 13.4<\/a><\/li>\n<li><a href=\"#mont\">macOS Monterey 12.6.6<\/a><\/li>\n<li><a href=\"#bs\">macOS Big Sur 11.7.7<\/a><\/li>\n<li><a href=\"#saf\">Safari 16.5 for macOS Monterey and Big Sur<\/a><\/li>\n<li><a href=\"#16\">iOS 16.5 and iPadOS 16.5<\/a><\/li>\n<li><a href=\"#15\">iOS 15.7.6 and iPadOS 15.7.6<\/a><\/li>\n<li><a href=\"#12\">iOS 12 \u2014 no updates since January<\/a><\/li>\n<li><a href=\"#wat\">watchOS 9.5<\/a><\/li>\n<li><a href=\"#8\">watchOS 8 \u2014 still no security updates for ten months<\/a><\/li>\n<li><a href=\"#tv\">tvOS 16.5<\/a><\/li>\n<li><a href=\"#hom\">audioOS 16.5<\/a><\/li>\n<li><a href=\"#rsr\">An update on the first Rapid Security Response<\/a><\/li>\n<li><a href=\"#keys\">Key takeaways<\/a><\/li>\n<li><a href=\"#learnmore\">How can I learn more?<\/a><a name=\"0d\"><\/a><\/li>\n<\/ul>\n<h3>Apple addresses three zero-day vulnerabilities<\/h3>\n<p>Notably, every single operating system that was updated this week received patches for <strong>three &#8220;actively exploited&#8221; (i.e. in-the-wild) vulnerabilities<\/strong> in WebKit. Two of these were patched previously for only macOS Ventura, iOS 16, and iPadOS 16, as part of <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-issues-first-rapid-security-response-for-macos-ios-ipados\/\">Apple&#8217;s first-ever Rapid Security Response update on May 1<\/a>.<\/p>\n<blockquote><p><strong>WebKit<br \/>\n<\/strong><\/p>\n<p>Impact: A remote attacker may be able to break out of Web Content sandbox. <span style=\"color: #ff0000;\">Apple is aware of a report that this issue may have been actively exploited.<\/span><\/p>\n<p>Description: The issue was addressed with improved bounds checks.<\/p>\n<p>WebKit Bugzilla: 255350<br \/>\nCVE-2023-32409: Cl\u00e9ment Lecigne of Google&#8217;s Threat Analysis Group and Donncha \u00d3 Cearbhaill of Amnesty International\u2019s Security Lab<\/p>\n<p>&nbsp;<\/p>\n<p>Impact: Processing web content may disclose sensitive information. <span style=\"color: #ff0000;\">Apple is aware of a report that this issue may have been actively exploited.<\/span><\/p>\n<p>Description: An out-of-bounds read was addressed with improved input validation.<\/p>\n<p>WebKit Bugzilla: 254930<br \/>\nCVE-2023-28204: an anonymous researcher<br \/>\nThis issue was first addressed in Rapid Security Response macOS 13.3.1 (a).<\/p>\n<p>&nbsp;<\/p>\n<p>Impact: Processing maliciously crafted web content may lead to arbitrary code execution. <span style=\"color: #ff0000;\">Apple is aware of a report that this issue may have been actively exploited.<\/span><\/p>\n<p>Description: A use-after-free issue was addressed with improved memory management.<\/p>\n<p>WebKit Bugzilla: 254840<br \/>\nCVE-2023-32373: an anonymous researcher<br \/>\nThis issue was first addressed in Rapid Security Response macOS 13.3.1 (a).<\/p><\/blockquote>\n<p>All of the updates below include these three urgent patches. (Technically, macOS Monterey and Big Sur received these patches in the form of their separate Safari update.)<a name=\"vent\"><\/a><\/p>\n<h3>macOS Ventura 13.4<\/h3>\n<p><strong>Available for:<\/strong><br \/>\nAll supported Macs currently running macOS Ventura<\/p>\n<p><strong>New features:<\/strong><\/p>\n<ul>\n<li>Sports feed in the sidebar of Apple News gives easy access to stories, scores, standings, and more, for the teams and leagues you follow<\/li>\n<li>My Sports score and schedule cards in Apple News take you directly to game pages where you can find additional details about specific games<\/li>\n<\/ul>\n<p><strong>Enterprise:<\/strong><\/p>\n<div>\n<ul>\n<li>You can now sign in with your Apple ID in Software Update to install beta updates. <a href=\"https:\/\/appleseed.apple.com\/it\">See the documentation on AppleSeed for IT<\/a>\u00a0for more information.<\/li>\n<li>Safari now sets network traffic class based on the WebRTC priority property.<\/li>\n<li>Files no longer fail to open after you move or rename them on a network share.<\/li>\n<\/ul>\n<\/div>\n<p><strong>Improvements and bug fixes:<\/strong><\/p>\n<ul>\n<li>Resolves an issue where Auto Unlock with Apple Watch does not log you into your Mac<\/li>\n<li>Fixes a Bluetooth issue where keyboards connect slowly to Mac after restarting<\/li>\n<li>Addresses a VoiceOver issue with navigating to landmarks on webpages<\/li>\n<li>Fixes an issue where Screen Time settings may reset or not sync across all devices<\/li>\n<li>Resolved an issue where HDMI output to some conference room hardware showed no video.<\/li>\n<li>Login with Active Directory mobile accounts no longer becomes unresponsive after FileVault unlock when the network is offline.<\/li>\n<\/ul>\n<p><strong>Security-related fixes and updates:<\/strong><br \/>\nAt least 51 vulnerabilities were addressed in this update. Aside from the three actively exploited vulnerabilities mentioned above, here are some interesting ones:<\/p>\n<blockquote><p><strong>Accessibility<\/strong><\/p>\n<p>Impact: Entitlements and privacy permissions granted to this app may be used by a malicious app<\/p>\n<p>Description: This issue was addressed with improved checks.<\/p>\n<p>CVE-2023-32400: Mickey Jin (@patch1t)<\/p>\n<p>&nbsp;<\/p>\n<p><strong>LaunchServices<\/strong><\/p>\n<p>Impact: An app may bypass Gatekeeper checks<\/p>\n<p>Description: A logic issue was addressed with improved checks.<\/p>\n<p>CVE-2023-32352: Wojciech Regu\u0142a (@_r3ggi) of SecuRing (wojciechregula.blog)<\/p>\n<p>&nbsp;<\/p>\n<p><strong>PackageKit<\/strong><\/p>\n<p>Impact: An app may be able to modify protected parts of the file system<\/p>\n<p>Description: A logic issue was addressed with improved state management.<\/p>\n<p>CVE-2023-32355: Mickey Jin (@patch1t)<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Photos<br \/>\n<\/strong><\/p>\n<p>Impact: Photos belonging to the Hidden Photos Album could be viewed without authentication through Visual Lookup<\/p>\n<p>Description: The issue was addressed with improved checks.<\/p>\n<p>CVE-2023-32390: Julian Szulc<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Screen Saver<br \/>\n<\/strong><\/p>\n<p>Impact: An app may be able to bypass Privacy preferences<\/p>\n<p>Description: A permissions issue was addressed by removing vulnerable code and adding additional checks.<\/p>\n<p>CVE-2023-32363: Mickey Jin (@patch1t)<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Siri<br \/>\n<\/strong><\/p>\n<p>Impact: A person with physical access to a device may be able to view contact information from the lock screen<\/p>\n<p>Description: The issue was addressed with improved checks.<\/p>\n<p>CVE-2023-32394: Khiem Tran<\/p><\/blockquote>\n<p>For the full list of security patches included in Ventura 13.4, <a href=\"https:\/\/support.apple.com\/en-us\/HT213758\" target=\"_blank\" rel=\"noopener\">have a look here<\/a>.<\/p>\n<p>Users of macOS Ventura can get this update by going to <strong>System Settings<\/strong> &gt; <strong>General<\/strong> &gt; <strong>Software Update<\/strong>.<\/p>\n<p>If your Mac is running macOS Mojave, Catalina, Big Sur, or Monterey, and your Mac is compatible with macOS Ventura, you can upgrade to macOS Ventura by going to <strong>System Preferences<\/strong> &gt; <strong>Software Update<\/strong>. If your Mac is running macOS High Sierra or older and is compatible with macOS Ventura, look for macOS Ventura in the Mac App Store and download it from there.<a name=\"mont\"><\/a><\/p>\n<h3>macOS Monterey 12.6.6<\/h3>\n<p><strong>Available for:<\/strong><br \/>\nAll supported Macs currently running macOS Monterey<\/p>\n<p><strong>Security-related fixes and updates:<\/strong><br \/>\nAt least 29 vulnerabilities were addressed. They are a subset of the vulnerabilities addressed in the macOS Ventura update.<\/p>\n<p>For the full list of security patches included in Monterey 12.6.6, <a href=\"https:\/\/support.apple.com\/en-us\/HT213759\" target=\"_blank\" rel=\"noopener\">have a look here<\/a>.<\/p>\n<p>You can get this update by going to <strong>System Preferences<\/strong> &gt; <strong>Software Update<\/strong>.<a name=\"bs\"><\/a><\/p>\n<h3>macOS Big Sur 11.7.7<\/h3>\n<p><strong>Available for:<\/strong><br \/>\nAll supported Macs currently running macOS Big Sur<\/p>\n<p><strong>Security-related fixes and updates:<\/strong><br \/>\nAt least 25 vulnerabilities were addressed in this update, all of them the same as those addressed in the macOS Monterey and Ventura updates.<\/p>\n<p>For the full list of security patches included in Big Sur 11.7.7, <a href=\"https:\/\/support.apple.com\/en-us\/HT213760\" target=\"_blank\" rel=\"noopener\">have a look here<\/a>.<\/p>\n<p>You can get this update by going to <strong>System Preferences<\/strong> &gt; <strong>Software Update<\/strong>.<a name=\"saf\"><\/a><\/p>\n<h3>Safari 16.5 for macOS Monterey and Big Sur<\/h3>\n<p><strong>Available for:<\/strong><br \/>\nmacOS Big Sur and macOS Monterey.<\/p>\n<p>This update addresses 5 WebKit issues, the same as those addressed in the macOS updates. Please keep in mind, macOS Big Sur and Monterey users will need to install Safari 16.5 to receive the vulnerability fixes for the potentially exploited vulnerabilities.<\/p>\n<p>The short list of fixes <a href=\"https:\/\/support.apple.com\/en-us\/HT213762\" target=\"_blank\" rel=\"noopener\">can be seen here<\/a>, and the update is available in <strong>System Preferences<\/strong> &gt;<strong> Software Update<\/strong> on your Mac. It will pop up as an available update once macOS 12.6.6 or 11.7.7 has been installed.<a name=\"16\"><\/a><\/p>\n<h3>iOS 16.5 and iPadOS 16.5<\/h3>\n<p><strong>Available for:<\/strong><br \/>\niPhone 8 and later, iPad Pro (all models), iPad Air 3rd generation and later, iPad 5th generation and later, and iPad mini 5th generation and later<\/p>\n<p><strong>New features &amp; functionality:<br \/>\n<\/strong><\/p>\n<ul>\n<li>A new Pride Celebration wallpaper for the Lock Screen to honor the LGBTQ+ community and culture<\/li>\n<li>Sports tab in Apple News gives easy access to stories, scores, standings, and more, for the teams and leagues you follow<\/li>\n<li>My Sports score and schedule cards in Apple News take you directly to game pages where you can find additional details about specific games<\/li>\n<\/ul>\n<p><strong>Enterprise:<\/strong><\/p>\n<ul>\n<li>You can now sign in with your managed Apple ID in Software Update to install beta updates. <a href=\"https:\/\/appleseed.apple.com\/it\">See the documentation on AppleSeed for IT<\/a> for more information.<\/li>\n<li>Safari now sets network traffic class based on the WebRTC priority property.<\/li>\n<\/ul>\n<p><strong>Improvements and bug fixes:<\/strong><\/p>\n<ul>\n<li>Fixes an issue where Spotlight may become unresponsive<\/li>\n<li>Addresses an issue where Podcasts in CarPlay may not load content<\/li>\n<li>Fixes an issue where Screen Time settings may reset or not sync across all devices<\/li>\n<li>Resolves an issue where Verizon users were unable to auto-dial conference room numbers.<\/li>\n<li>The error message \u201cCannot Send Email\u201d no longer appears when an email sends successfully.<\/li>\n<li>Text message verification codes now work when using federation with Microsoft multifactor authentication.<\/li>\n<\/ul>\n<p><strong>Security-related fixes and updates:<\/strong><br \/>\nAt least <s>39<\/s> <strong>44<\/strong> vulnerabilities were addressed in this update, most of them the same as those addressed in the macOS updates. For iOS and iPadOS 16.5 the WebKit exploits have been addressed as well.\u00a0<strong>Update:\u00a0<\/strong>Apple added five additional vulnerabilities to the list on September 5, 2023.<\/p>\n<p>The full list of security issues that were addressed can be found <a href=\"https:\/\/support.apple.com\/en-us\/HT213757\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>. To get your hands on this latest update, connect your device to your Mac and follow the update prompts. You can also download these updates over the air by going to <strong>Settings<\/strong> &gt; <strong>General<\/strong> &gt; <strong>Software Update<\/strong> on your device.<a name=\"15\"><\/a><\/p>\n<h3>iOS 15.7.6 and iPadOS 15.7.6<\/h3>\n<p><strong>Available for:<\/strong><br \/>\niPhone 6s (all models), iPhone 7 (all models), iPhone SE (1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch (7th generation)<\/p>\n<p><strong>Security-related fixes and updates:<\/strong><br \/>\nAt least 17 vulnerabilities were addressed in this update\u2014less than half the number of those addressed in iOS 16.5. Of particular concern, <strong>the iOS and iPadOS 15.7.6 updates only patch two of the three actively exploited WebKit vulnerabilities.<\/strong> Users whose devices are incapable of upgrading to iOS or iPadOS 16 should consider buying newer hardware that supports the current, and fully patched, operating systems.<\/p>\n<p>The full list of security issues that were addressed can be found <a href=\"https:\/\/support.apple.com\/en-us\/HT213765\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>. To get this latest update, connect your device to your Mac and follow the update prompts. You can also download these updates over the air by going to <strong>Settings<\/strong> &gt; <strong>General<\/strong> &gt; <strong>Software Update<\/strong> on your device.<a name=\"12\"><\/a><\/p>\n<h3>iOS 12 \u2014 no updates since January<\/h3>\n<p>Apple has not released a corresponding security update for older devices stuck on iOS 12. The most recent, and possibly final, security update for iOS 12 was released in January 2023, and it only patched a single vulnerability.<\/p>\n<p>Again, users whose devices are incapable of upgrading to iOS or iPadOS 16 should consider buying newer hardware that supports the current, and fully patched, operating systems.<a name=\"wat\"><\/a><\/p>\n<h3>watchOS 9.5<\/h3>\n<p><strong>Available for:<\/strong><br \/>\nApple Watch Series 4 and later<\/p>\n<p><strong>Security-related fixes and updates:<br \/>\n<\/strong>At least 32 vulnerabilities were addressed in this update, all of them the same as those covered in the previously mentioned OS updates.<\/p>\n<p>The full list of security issues that were addressed can be found <a href=\"https:\/\/support.apple.com\/en-us\/HT213764\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>. To install this update, make sure your iPhone is up to date first, both your phone and watch are connected to the same Wi-Fi network, and the watch has at least a 50% charge. Then open the Watch app on your phone and tap <strong>General<\/strong> &gt; <strong>Software Update<\/strong>.<a name=\"8\"><\/a><\/p>\n<h3>watchOS 8 \u2014 still no security updates for ten months<\/h3>\n<p>Although this may be the last time we&#8217;ll mention it in one of these round-ups, there&#8217;s still no watchOS 8 security update for Apple Watch Series 3, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-stops-selling-watch-series-3-eight-months-after-its-last-security-update\/\" rel=\"noopener\">which Apple still sold refurbished until March<\/a>. For unknown reasons, Apple chose not to release watchOS 9 for this model. This put the device in an awkward state of limbo for <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-stops-selling-watch-series-3-eight-months-after-its-last-security-update\/\">eight months, while Apple still sold it, knowing it was dangerously vulnerable<\/a>. It would appear at this point that Apple intends to leave this watch model in a perpetually vulnerable state.<\/p>\n<p>The most recent update for watchOS 8 was in mid-August 2022, about a month before watchOS 9 came out. The most recent watchOS update that included security fixes came a month prior, in July 2022. (Concerningly, Apple chose not to patch two &#8220;actively exploited&#8221; vulnerabilities for watchOS 8.7.1 in its August patch cycle. However, both vulnerabilities were later patched in watchOS 9.0.) Now it has been 10 months since the Apple Watch Series 3 has gotten any security updates.<\/p>\n<p>As we&#8217;ve mentioned before, simultaneous updates for watchOS versions would not be unprecedented. As recently as late 2020, Apple released simultaneous updates for <a href=\"https:\/\/support.apple.com\/en-us\/HT201222\" target=\"_blank\" rel=\"noopener\">two or three watchOS versions at a time<\/a>, mainly to support older Apple Watch models.<\/p>\n<p>It&#8217;s hard to understand how Apple could justify such seemingly negligent behavior regarding a product that it was still selling.<\/p>\n<p>Intego has <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-stops-selling-watch-series-3-eight-months-after-its-last-security-update\/\">asked Apple multiple times<\/a> for an update regarding watchOS 8 security updates for the Apple Watch Series 3, but Apple has continually neglected to respond to our inquiries. It&#8217;s quite evident at this point that Apple has no intention of releasing any further security updates for the watch it stopped selling two months ago.<\/p>\n<p><strong>Update:<\/strong> The month after this article was published, Apple released <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-gives-watch-series-3-users-false-sense-of-security-patching-1-vulnerability\/\">a patch for a single security vulnerability<\/a> affecting watchOS 8\u2014but continued to neglect to patch any of the other major vulnerabilities that have impacted watchOS 8 over the previous 11 months.<a name=\"tv\"><\/a><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"NNsYGqirQ5\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-gives-watch-series-3-users-false-sense-of-security-patching-1-vulnerability\/\">Apple gives Watch Series 3 users false sense of security, patching 1 vulnerability<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Apple gives Watch Series 3 users false sense of security, patching 1 vulnerability&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/apple-gives-watch-series-3-users-false-sense-of-security-patching-1-vulnerability\/embed\/#?secret=NNsYGqirQ5\" data-secret=\"NNsYGqirQ5\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<h3>tvOS 16.5<\/h3>\n<div><strong>Available for:<\/strong><br \/>\nApple TV 4K (all models) and Apple TV HD<\/div>\n<p><strong>Security-related fixes and updates:<\/strong><br \/>\nAt least 28 vulnerabilities were addressed in this update, all of them the same as those covered in the previously mentioned OS updates.<\/p>\n<p>The full list of security issues that were addressed can be found <a href=\"https:\/\/support.apple.com\/en-us\/HT213761\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<a name=\"hom\"><\/a><\/p>\n<h3>audioOS 16.5<\/h3>\n<p>Apple&#8217;s rarely-mentioned audioOS (also known as HomePod Software, or HomePodOS) for HomePod mini also received an update. Apple has never mentioned this operating system on its <a href=\"https:\/\/support.apple.com\/en-us\/HT201222\" target=\"_blank\" rel=\"noopener\">security updates page<\/a>, so it is unclear whether any security issues were addressed in this week&#8217;s update. However, according to the <a href=\"https:\/\/mrmacintosh.com\/blog\/\" target=\"_blank\" rel=\"noopener\">Mr. Macintosh blog<\/a>, which keeps track of OS version numbers, the audioOS build numbers match those of tvOS, which seems to imply that the HomePod runs essentially the same operating system as the Apple TV.<\/p>\n<p>HomePod updates are generally not urgent, and they are supposed to install automatically. However, if you would like to update your HomePod or HomePod mini&#8217;s operating system manually, you can go into the <strong>Home<\/strong> app on your iPhone or iPad, then tap the\u00a0<strong>House icon<\/strong> &gt; <strong>Home Settings<\/strong> &gt;<strong> Software Update<\/strong> &gt; temporarily disable (toggle off) <strong>Install Updates Automatically<\/strong> &gt; then tap <strong>Install<\/strong>. After updating, remember to <strong>re-enable the Install Updates Automatically<\/strong> setting.<a name=\"rsr\"><\/a><\/p>\n<h3>An update on the first Rapid Security Response<\/h3>\n<p>When Apple pushed out its first <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-issues-first-rapid-security-response-for-macos-ios-ipados\/\" target=\"_blank\" rel=\"noopener\">Rapid Security Responses<\/a> (RSR) in early May, the company did not release any documentation about the contents of the updates.<\/p>\n<p>Apple&#8217;s latest macOS, iOS, and iPadOS versions received an &#8220;(a)&#8221; addendum to their version numbers, namely macOS <span class=\"note\">13.3.1 (a), <\/span>iOS 16.4.1 (a), iPadOS 16.4.1 (a).<\/p>\n<p><span class=\"note\">With the release of Thursday&#8217;s updates, it has become clearer how Apple plans to document these RSRs going forward. Unless Apple changes course, the company apparently won&#8217;t give RSRs their own line items on the <a href=\"https:\/\/support.apple.com\/en-us\/HT201222\" target=\"_blank\" rel=\"noopener\">Apple security updates page<\/a>. Instead, the release notes of future updates will mention which vulnerabilities were patched in an RSR.<\/span><\/p>\n<p><span class=\"note\">Two of the three &#8220;actively exploited&#8221; WebKit vulnerabilities fixed this week note that &#8220;This issue was first addressed in Rapid Security Response macOS 13.3.1 (a)&#8221; or &#8220;iOS 16.4.1 (a) and iPadOS 16.4.1 (a)&#8221; on their respective security release notes pages.<\/span><\/p>\n<p>While not knowing exactly what is being addressed at the time these RSRs roll out is uncomfortable for some, it is good to know that Apple does intend to document them later.<\/p>\n<p>Receiving patches for your Mac, iPhone, or iPad weeks early is a nice benefit for those running the latest operating systems. On the other hand, it is a bit concerning that Apple Watch, which also gets text messages and displays Web content, does not get an RSR of its own.<a name=\"keys\"><\/a><\/p>\n<h3>Key takeaways<\/h3>\n<p>If you get nothing else out of this article, here are some key points:<\/p>\n<ul>\n<li>Apple released urgent security updates this week; <strong>check for and install updates on your Macs, iPhones, iPads, and other Apple devices<\/strong> as soon as possible.<\/li>\n<li>At this point, <strong>macOS Ventura, iOS 16, and iPadOS 16 are the only safe operating systems<\/strong> to use on Macs, iPhones, and iPads, respectively.\n<ul>\n<li>If you have a Mac for which Apple doesn&#8217;t officially support Ventura, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-keep-older-macs-secure-a-geeky-approach\/\">you may be able to upgrade it anyway<\/a>.<\/li>\n<li>If you have an older iPhone or iPad that isn&#8217;t compatible with 16.x, or any iPod touch, buying a new device is the safest option.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>It is advisable to update to the latest operating systems as soon as you reasonably can, especially when Apple releases a Rapid Security Response or otherwise warns that there are &#8220;actively exploited&#8221; vulnerabilities in the wild. It&#8217;s important to get the benefits of new security fixes as quickly as possible to help you stay protected from hackers and malware.<\/p>\n<p>If you have a Mac running macOS Monterey or Big Sur that&#8217;s compatible with Ventura, you may wish to update to the current Monterey or Big Sur version, and then as soon as practical, upgrade to macOS Ventura. <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-potentially-make-users-security-and-privacy-precarious\/\">Here&#8217;s why.<\/a> Generally speaking, it is best to upgrade to the latest Apple OS versions quickly for security reasons. For maximum security, one cannot rely on any minimal security patches Apple may release for previous OS versions.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"GrZmxxkTr0\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-potentially-make-users-security-and-privacy-precarious\/\">Apple&#8217;s Poor Patching Policies Potentially Make Users&#8217; Security and Privacy Precarious<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Apple&#8217;s Poor Patching Policies Potentially Make Users&#8217; Security and Privacy Precarious&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-potentially-make-users-security-and-privacy-precarious\/embed\/#?secret=GrZmxxkTr0\" data-secret=\"GrZmxxkTr0\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>Whenever you&#8217;re preparing to update iOS, iPadOS, or macOS, always back up your data before installing any updates. This gives you a restore point if something does not go as planned.<\/p>\n<p>See also our related article on <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-verify-your-backups-are-working-properly\/\">how to check your macOS backups to ensure they work correctly<\/a>.<a name=\"learnmore\"><\/a><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"kb2RpotCZB\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-verify-your-backups-are-working-properly\/\">How to Verify Your Backups are Working Properly<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;How to Verify Your Backups are Working Properly&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-verify-your-backups-are-working-properly\/embed\/#?secret=kb2RpotCZB\" data-secret=\"kb2RpotCZB\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<h3>How can I learn more?<\/h3>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, including security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Twitter-logo-icon-64.png\" alt=\"Follow Intego on Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Facebook-logo-icon-64.png\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/YouTube-logo-icon-64.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Pinterest-logo-icon-64.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/LinkedIn-logo-icon-64.png\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Instagram-logo-icon-64.png\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>On Thursday, May 18, Apple released updates to all of its operating systems. The updates included new features as well as security-related fixes\u2014including for three &#8220;actively exploited&#8221; vulnerabilities. Let&#8217;s take a look at the highlights of each update. In this article: Apple addresses three zero-day vulnerabilities macOS Ventura 13.4 macOS Monterey 12.6.6 macOS Big Sur [&hellip;]<\/p>\n","protected":false},"author":79,"featured_media":97207,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[11],"tags":[24,2197,69,4627,4645,4564,3175,4589,4618,4643,115,201,4583],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"On Thursday, May 18, Apple released updates to all of its operating systems. The updates included new features as well as security-related fixes\u2014including\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-4-ios-16-5-fix-3-actively-exploited-vulns\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Urgent Patches: macOS Ventura 13.4, iOS 16.5 fix 3 actively exploited vulns - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"On Thursday, May 18, Apple released updates to all of its operating systems. The updates included new features as well as security-related fixes\u2014including\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-4-ios-16-5-fix-3-actively-exploited-vulns\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-19T06:07:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-18T01:47:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-400x260-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jay Vrijenhoek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"15 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-4-ios-16-5-fix-3-actively-exploited-vulns\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-400x260-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-400x260-1.png\",\"width\":400,\"height\":260,\"caption\":\"Apple software update red critical urgent actively exploited zero-day vulnerability\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-4-ios-16-5-fix-3-actively-exploited-vulns\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-4-ios-16-5-fix-3-actively-exploited-vulns\/\",\"name\":\"Urgent Patches: macOS Ventura 13.4, iOS 16.5 fix 3 actively exploited vulns - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-4-ios-16-5-fix-3-actively-exploited-vulns\/#primaryimage\"},\"datePublished\":\"2023-05-19T06:07:48+00:00\",\"dateModified\":\"2023-09-18T01:47:20+00:00\",\"description\":\"On Thursday, May 18, Apple released updates to all of its operating systems. The updates included new features as well as security-related fixes\\u2014including\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-4-ios-16-5-fix-3-actively-exploited-vulns\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-4-ios-16-5-fix-3-actively-exploited-vulns\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-4-ios-16-5-fix-3-actively-exploited-vulns\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Urgent Patches: macOS Ventura 13.4, iOS 16.5 fix 3 actively exploited vulns\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-4-ios-16-5-fix-3-actively-exploited-vulns\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-4-ios-16-5-fix-3-actively-exploited-vulns\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\"},\"headline\":\"Urgent Patches: macOS Ventura 13.4, iOS 16.5 fix 3 actively exploited vulns\",\"datePublished\":\"2023-05-19T06:07:48+00:00\",\"dateModified\":\"2023-09-18T01:47:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-4-ios-16-5-fix-3-actively-exploited-vulns\/#webpage\"},\"wordCount\":2853,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-4-ios-16-5-fix-3-actively-exploited-vulns\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-400x260-1.png\",\"keywords\":[\"Apple TV\",\"Apple Watch\",\"iOS\",\"iOS 15\",\"iOS 16\",\"iPadOS\",\"macOS\",\"macOS Big Sur\",\"macOS Monterey\",\"macOS Ventura\",\"Safari\",\"Security Updates\",\"watchOS\"],\"articleSection\":[\"Software &amp; Apps\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-4-ios-16-5-fix-3-actively-exploited-vulns\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\",\"name\":\"Jay Vrijenhoek\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"caption\":\"Jay Vrijenhoek\"},\"description\":\"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"On Thursday, May 18, Apple released updates to all of its operating systems. The updates included new features as well as security-related fixes\u2014including","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-4-ios-16-5-fix-3-actively-exploited-vulns\/","og_locale":"en_US","og_type":"article","og_title":"Urgent Patches: macOS Ventura 13.4, iOS 16.5 fix 3 actively exploited vulns - The Mac Security Blog","og_description":"On Thursday, May 18, Apple released updates to all of its operating systems. The updates included new features as well as security-related fixes\u2014including","og_url":"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-4-ios-16-5-fix-3-actively-exploited-vulns\/","og_site_name":"The Mac Security Blog","article_published_time":"2023-05-19T06:07:48+00:00","article_modified_time":"2023-09-18T01:47:20+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-400x260-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jay Vrijenhoek","Est. reading time":"15 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-4-ios-16-5-fix-3-actively-exploited-vulns\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-400x260-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-400x260-1.png","width":400,"height":260,"caption":"Apple software update red critical urgent actively exploited zero-day vulnerability"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-4-ios-16-5-fix-3-actively-exploited-vulns\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-4-ios-16-5-fix-3-actively-exploited-vulns\/","name":"Urgent Patches: macOS Ventura 13.4, iOS 16.5 fix 3 actively exploited vulns - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-4-ios-16-5-fix-3-actively-exploited-vulns\/#primaryimage"},"datePublished":"2023-05-19T06:07:48+00:00","dateModified":"2023-09-18T01:47:20+00:00","description":"On Thursday, May 18, Apple released updates to all of its operating systems. The updates included new features as well as security-related fixes\u2014including","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-4-ios-16-5-fix-3-actively-exploited-vulns\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-4-ios-16-5-fix-3-actively-exploited-vulns\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-4-ios-16-5-fix-3-actively-exploited-vulns\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Urgent Patches: macOS Ventura 13.4, iOS 16.5 fix 3 actively exploited vulns"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-4-ios-16-5-fix-3-actively-exploited-vulns\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-4-ios-16-5-fix-3-actively-exploited-vulns\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0"},"headline":"Urgent Patches: macOS Ventura 13.4, iOS 16.5 fix 3 actively exploited vulns","datePublished":"2023-05-19T06:07:48+00:00","dateModified":"2023-09-18T01:47:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-4-ios-16-5-fix-3-actively-exploited-vulns\/#webpage"},"wordCount":2853,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-4-ios-16-5-fix-3-actively-exploited-vulns\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-400x260-1.png","keywords":["Apple TV","Apple Watch","iOS","iOS 15","iOS 16","iPadOS","macOS","macOS Big Sur","macOS Monterey","macOS Ventura","Safari","Security Updates","watchOS"],"articleSection":["Software &amp; Apps"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-4-ios-16-5-fix-3-actively-exploited-vulns\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0","name":"Jay Vrijenhoek","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","caption":"Jay Vrijenhoek"},"description":"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.","url":"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-400x260-1.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-puS","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/98014"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/79"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=98014"}],"version-history":[{"count":6,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/98014\/revisions"}],"predecessor-version":[{"id":98872,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/98014\/revisions\/98872"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/97207"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=98014"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=98014"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=98014"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}