{"id":98339,"date":"2023-06-23T13:54:17","date_gmt":"2023-06-23T20:54:17","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=98339"},"modified":"2023-06-25T18:11:02","modified_gmt":"2023-06-26T01:11:02","slug":"apple-gives-watch-series-3-users-false-sense-of-security-patching-1-vulnerability","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/apple-gives-watch-series-3-users-false-sense-of-security-patching-1-vulnerability\/","title":{"rendered":"Apple gives Watch Series 3 users false sense of security, patching 1 vulnerability"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-97473\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/Apple-Watch-Series-3-headstone-graveyard-600x320-1.jpg\" alt=\"\" width=\"600\" height=\"320\" \/><\/p>\n<p>This week, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-vulns-used-to-infect-russian-iphones-with-triangledb-malware\/\">Apple released watchOS 8.8.1<\/a>, a surprise security update for the Apple Watch Series 3. This was the first security update compatible with the Series 3 since 11 months ago, in July 2022.<\/p>\n<p>This is kind of a big deal, but not for the reason you might think. Sure, it&#8217;s great that Apple patched a vulnerability. But that&#8217;s just it\u2014Apple patched one, single, solitary vulnerability. Apple has yet again set a precedent of giving users a false sense of security by releasing incomplete patches. <strong>Here&#8217;s the whole story\u2014that Apple doesn&#8217;t want you to know.<\/strong><\/p>\n<p>In this article:<\/p>\n<ul>\n<li><a href=\"#back\">What&#8217;s the back story with watchOS 8 and Apple Watch Series 3?<\/a><\/li>\n<li><a href=\"#repent\">Does the release of watchOS 8.8.1 mean Apple has repented?<\/a><\/li>\n<li><a href=\"#before\">Has Apple ever done anything like this before?<\/a>\n<ul>\n<li><a href=\"#oldhard\">Apple&#8217;s history of discontinuing security updates for recently sold hardware<\/a><\/li>\n<li><a href=\"#oldos\">Apple&#8217;s history of providing incomplete patches for older OS versions<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"#learnmore\">How can I learn more?<\/a><a name=\"back\"><\/a><\/li>\n<\/ul>\n<h3>What&#8217;s the back story with watchOS 8 and Apple Watch Series 3?<\/h3>\n<p>For reasons that Apple has never disclosed, the Apple Watch Series 3 is the only model stuck on watchOS 8; the Series 4 and later watches are all compatible with the latest watchOS 9 updates.<\/p>\n<p>Apple&#8217;s decision to not support watchOS 9 on the Series 3 was mystifying.<\/p>\n<p>The company continued to sell this watch model in the main section of its online store right up until five days before the release of watchOS 9.<\/p>\n<p>Mind you, this was three months after the June 2022 WWDC, when Apple quietly revealed that the Series 3 would not be compatible with watchOS 9, yet Apple continued to feature the watch prominently in its online store for three more months.<\/p>\n<p>Even after watchOS 9 was released and Apple removed Apple Watch Series 3 from the main section of its online store, Apple continued to sell refurbished units of the Series 3 for an additional eight months, until March 2023.<\/p>\n<p>During this entire time that Apple continued selling the Series 3, Apple released precisely zero security updates for it\u2014<strong>in spite of there being known &#8220;actively exploited&#8221; vulnerabilities impacting watchOS 8<\/strong>.<\/p>\n<p>It&#8217;s truly a wonder that Apple has not been sued for its gross negligence. Apple knowingly left its customers vulnerable, and knowingly continued selling a device with in-the-wild exploited vulnerabilities.<a name=\"repent\"><\/a><\/p>\n<h3>Does the release of watchOS 8.8.1 mean Apple has repented?<\/h3>\n<p>So, now that Apple has finally released the first security update for watchOS 8 in nearly a year, does that mean that Apple has repented of its sins, and made things right for Series 3 watch owners?<\/p>\n<p>Sadly, no.<\/p>\n<p><strong>What we actually got with watchOS 8.8.1 was a single patch, for a single vulnerability.<\/strong> Yes, it was <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-vulns-used-to-infect-russian-iphones-with-triangledb-malware\/\">an actively exploited vulnerability<\/a>\u2014and that&#8217;s a big deal, because it means it was confirmed to have been used in real-world attacks.<\/p>\n<p>But it won&#8217;t be obvious to Apple Watch Series 3 users that all the other vulnerabilities that have remained unaddressed for the past 11 months are still there. They&#8217;ll see the watchOS 8.8.1 update, and notice that it says it&#8217;s a security update, and install it. And they won&#8217;t give it another thought.<\/p>\n<p>They&#8217;ll continue to be blissfully unaware that their watches are still highly vulnerable. They won&#8217;t know that they still haven&#8217;t received patches for the two actively exploited vulnerabilities that Apple addressed only for watchOS 9.0, let alone dozens of other vulnerabilities in that update, and dozens since then that likely also impact watchOS 8.<\/p>\n<p>If you&#8217;re one of those folks who\u2026<\/p>\n<ul>\n<li><strong>bought a brand new Series 3 from Apple in early June 2022<\/strong> (right before Apple silently revealed, on an obscure page of its site, that Series 3 wouldn&#8217;t support watchOS 9 in just <strong>three months<\/strong>\u2014with no indication that you&#8217;d be cut off from security updates before then as well)<\/li>\n<li><strong>bought a brand new Series 3 from Apple in early September 2022<\/strong> (just days before the release of watchOS 9\u2014because Apple didn&#8217;t make it clear to you that it wouldn&#8217;t be compatible and that you wouldn&#8217;t get security updates anymore)<\/li>\n<li><strong>bought a refurbished Series 3 from Apple in March 2023<\/strong> (unaware that it was already <strong>8 months past its last security update<\/strong>)<\/li>\n<\/ul>\n<p>\u2026I truly feel for you, and I&#8217;m sorry that Apple has wronged you and violated your trust in this way. If you feel that Apple has treated you unjustly, I hope that somehow, someone at Apple will find some way to make it up to you in a satisfactory way.<\/p>\n<p>But chances are that you, dear Series 3 user, aren&#8217;t even reading this article, and you&#8217;ll never know any better.<\/p>\n<p>And chances are that, like my article back in March, this will get zero coverage from the mainstream press, and little to no coverage from the tech news press, or small outlets that cover Apple news.<\/p>\n<p>And chances are that precious few will ever know about this, and Apple won&#8217;t feel any obligation to actually make things right.<\/p>\n<p>After all, who cares about a giant mega-corporation, with more cash on hand than any other in the world, knowingly putting its paying customers at severe personal risk of having their data stolen, their devices hacked, and their privacy violated? Surely there aren&#8217;t any consumer protection laws against such things. And anyway, everyone knows that Apple is always the good guy. Because &#8220;<a href=\"https:\/\/www.apple.com\/privacy\/\" target=\"_blank\" rel=\"noopener\">Privacy. That&#8217;s Apple.<\/a>&#8221; <img loading=\"lazy\" class=\"alignnone size-full wp-image-98340\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/06\/apple-logo-with-security-lock.png\" alt=\"\" width=\"10\" height=\"13\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/06\/apple-logo-with-security-lock.png 181w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/06\/apple-logo-with-security-lock-115x150.png 115w\" sizes=\"(max-width: 10px) 100vw, 10px\" \/><a name=\"before\"><\/a><\/p>\n<h3>Has Apple ever done anything like this before?<a name=\"oldhard\"><\/a><\/h3>\n<p>Apple has committed similar sins in the past, although previous instances were not quite as egregious.<\/p>\n<h4><strong>Apple&#8217;s history of discontinuing security updates for recently sold hardware<\/strong><\/h4>\n<p>A couple of notable examples of hardware that Apple cut off from security updates shortly after their last date of sale were the iPod touch (6th generation) in 2019 and the iPod touch (7th generation) in 2022.<\/p>\n<p>Apple discontinued the 6th gen mere days before WWDC 2019\u2014at which time the company silently revealed that the 6th gen wouldn&#8217;t support iOS 13 which would be released three months later.<\/p>\n<p><a name=\"oldos\"><\/a>Apple did nearly the same thing when it discontinued the 7th gen (the final iPod touch model) a few weeks before WWDC 2022, at which time the company silently revealed that the 7th gen wouldn&#8217;t support iOS 16 which would be released three months later.<\/p>\n<p>&nbsp;<\/p>\n<h4><strong>Apple&#8217;s history of providing incomplete patches for older OS versions<\/strong><\/h4>\n<p>Setting aside cases where Apple dropped support for recently sold hardware, <strong>Apple routinely provides a false sense of security to Mac, iPhone, and iPad users<\/strong> by providing only selective, cherry-picked security updates for previous versions of macOS, iOS, and iPadOS, respectively. I&#8217;ve written and spoken about this extensively over the past two years; see for example my October 2021 article, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-potentially-make-users-security-and-privacy-precarious\/\">Apple&#8217;s Poor Patching Policies Potentially Make Users&#8217; Security and Privacy Precarious<\/a>. As I note in that article, Apple sometimes even neglects to patch <em>actively exploited<\/em> vulnerabilities for previous OS versions, <strong>knowingly leaving users vulnerable to in-the-wild exploits<\/strong>, unbeknownst to them.<\/p>\n<p>This is a real problem, because users with old hardware that&#8217;s incompatible with the latest (and fully patched) OS\u2014and users who simply don&#8217;t think they need to upgrade, and put it off for whatever reason\u2014will mistakenly think they&#8217;re getting <em>all<\/em> security updates, when in fact their devices remain vulnerable to dozens of exploitable bugs that attackers can leverage to compromise their security and privacy.<\/p>\n<p>Apple should either patch all vulnerabilities that are applicable to previous OS versions, or none\u2014or if it&#8217;s going to cherry-pick, Apple should provide frequent, clear warnings to users who stay behind on an old OS. Apple&#8217;s current practices deceive users of older OS versions into thinking they&#8217;re just as safe as if they were running the current major OS, which is far from the truth.<a name=\"learnmore\"><\/a><\/p>\n<h3>How can I learn more?<\/h3>\n<p>For more details on what was patched this week, see our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-vulns-used-to-infect-russian-iphones-with-triangledb-malware\/\">main article<\/a> about the updates.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"pcQqvZG3M7\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-vulns-used-to-infect-russian-iphones-with-triangledb-malware\/\">Apple patches vulns used to infect Russian iPhones with TriangleDB malware<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Apple patches vulns used to infect Russian iPhones with TriangleDB malware&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-vulns-used-to-infect-russian-iphones-with-triangledb-malware\/embed\/#?secret=pcQqvZG3M7\" data-secret=\"pcQqvZG3M7\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>We broke the story about <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-stops-selling-watch-series-3-eight-months-after-its-last-security-update\/\">Apple finally ending sales of refurbished Apple Watch Series 3<\/a> a few months ago, in March.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"tlXBgShtZr\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-stops-selling-watch-series-3-eight-months-after-its-last-security-update\/\">Apple stops selling Watch Series 3 \u2014 eight months after its last security update<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Apple stops selling Watch Series 3 \u2014 eight months after its last security update&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/apple-stops-selling-watch-series-3-eight-months-after-its-last-security-update\/embed\/#?secret=tlXBgShtZr\" data-secret=\"tlXBgShtZr\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>In previous articles, we&#8217;ve discussed <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apples-planned-obsolescence\/\">Apple&#8217;s planned obsolescence<\/a> in the context of its new-for-2022 operating systems including watchOS, and about <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-potentially-make-users-security-and-privacy-precarious\/\">Apple&#8217;s poor patching policies<\/a> with regard to macOS and iOS updates.<\/p>\n<p>We discussed the end-of-sale of the Apple Watch Series 3 on\u00a0<a href=\"https:\/\/podcast.intego.com\/283\">episode 283<\/a> of the Intego Mac Podcast.<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/player.fireside.fm\/v2\/GegHgcrH+Ij6eil22?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\" data-mce-fragment=\"1\"><\/iframe><\/p>\n<p>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Twitter-logo-icon-64.png\" alt=\"Follow Intego on Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Facebook-logo-icon-64.png\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/YouTube-logo-icon-64.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Pinterest-logo-icon-64.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/LinkedIn-logo-icon-64.png\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Instagram-logo-icon-64.png\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple leaves Watch Series 3 highly exploitable\u2014but gives users a false sense of security by patching a single vulnerability.<\/p>\n","protected":false},"author":14,"featured_media":97470,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[2197,3832,4583],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Apple leaves Watch Series 3 highly exploitable\u2014but gives users a false sense of security by patching a single vulnerability.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-gives-watch-series-3-users-false-sense-of-security-patching-1-vulnerability\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple gives Watch Series 3 users false sense of security, patching 1 vulnerability - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Apple leaves Watch Series 3 highly exploitable\u2014but gives users a false sense of security by patching a single vulnerability.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/apple-gives-watch-series-3-users-false-sense-of-security-patching-1-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-23T20:54:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-26T01:11:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/Apple-Watch-Series-3-headstone-graveyard-400x260-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-gives-watch-series-3-users-false-sense-of-security-patching-1-vulnerability\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/Apple-Watch-Series-3-headstone-graveyard-400x260-1.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/Apple-Watch-Series-3-headstone-graveyard-400x260-1.jpg\",\"width\":400,\"height\":260,\"caption\":\"Apple Watch Series 3 headstone gravestone graveyard\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-gives-watch-series-3-users-false-sense-of-security-patching-1-vulnerability\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-gives-watch-series-3-users-false-sense-of-security-patching-1-vulnerability\/\",\"name\":\"Apple gives Watch Series 3 users false sense of security, patching 1 vulnerability - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-gives-watch-series-3-users-false-sense-of-security-patching-1-vulnerability\/#primaryimage\"},\"datePublished\":\"2023-06-23T20:54:17+00:00\",\"dateModified\":\"2023-06-26T01:11:02+00:00\",\"description\":\"Apple leaves Watch Series 3 highly exploitable\\u2014but gives users a false sense of security by patching a single vulnerability.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-gives-watch-series-3-users-false-sense-of-security-patching-1-vulnerability\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-gives-watch-series-3-users-false-sense-of-security-patching-1-vulnerability\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-gives-watch-series-3-users-false-sense-of-security-patching-1-vulnerability\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple gives Watch Series 3 users false sense of security, patching 1 vulnerability\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-gives-watch-series-3-users-false-sense-of-security-patching-1-vulnerability\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-gives-watch-series-3-users-false-sense-of-security-patching-1-vulnerability\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Apple gives Watch Series 3 users false sense of security, patching 1 vulnerability\",\"datePublished\":\"2023-06-23T20:54:17+00:00\",\"dateModified\":\"2023-06-26T01:11:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-gives-watch-series-3-users-false-sense-of-security-patching-1-vulnerability\/#webpage\"},\"wordCount\":1429,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-gives-watch-series-3-users-false-sense-of-security-patching-1-vulnerability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/Apple-Watch-Series-3-headstone-graveyard-400x260-1.jpg\",\"keywords\":[\"Apple Watch\",\"Series 3 Apple Watch\",\"watchOS\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-gives-watch-series-3-users-false-sense-of-security-patching-1-vulnerability\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Apple leaves Watch Series 3 highly exploitable\u2014but gives users a false sense of security by patching a single vulnerability.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/apple-gives-watch-series-3-users-false-sense-of-security-patching-1-vulnerability\/","og_locale":"en_US","og_type":"article","og_title":"Apple gives Watch Series 3 users false sense of security, patching 1 vulnerability - The Mac Security Blog","og_description":"Apple leaves Watch Series 3 highly exploitable\u2014but gives users a false sense of security by patching a single vulnerability.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/apple-gives-watch-series-3-users-false-sense-of-security-patching-1-vulnerability\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2023-06-23T20:54:17+00:00","article_modified_time":"2023-06-26T01:11:02+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/Apple-Watch-Series-3-headstone-graveyard-400x260-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-gives-watch-series-3-users-false-sense-of-security-patching-1-vulnerability\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/Apple-Watch-Series-3-headstone-graveyard-400x260-1.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/Apple-Watch-Series-3-headstone-graveyard-400x260-1.jpg","width":400,"height":260,"caption":"Apple Watch Series 3 headstone gravestone graveyard"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-gives-watch-series-3-users-false-sense-of-security-patching-1-vulnerability\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/apple-gives-watch-series-3-users-false-sense-of-security-patching-1-vulnerability\/","name":"Apple gives Watch Series 3 users false sense of security, patching 1 vulnerability - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-gives-watch-series-3-users-false-sense-of-security-patching-1-vulnerability\/#primaryimage"},"datePublished":"2023-06-23T20:54:17+00:00","dateModified":"2023-06-26T01:11:02+00:00","description":"Apple leaves Watch Series 3 highly exploitable\u2014but gives users a false sense of security by patching a single vulnerability.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-gives-watch-series-3-users-false-sense-of-security-patching-1-vulnerability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-gives-watch-series-3-users-false-sense-of-security-patching-1-vulnerability\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-gives-watch-series-3-users-false-sense-of-security-patching-1-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Apple gives Watch Series 3 users false sense of security, patching 1 vulnerability"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-gives-watch-series-3-users-false-sense-of-security-patching-1-vulnerability\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-gives-watch-series-3-users-false-sense-of-security-patching-1-vulnerability\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Apple gives Watch Series 3 users false sense of security, patching 1 vulnerability","datePublished":"2023-06-23T20:54:17+00:00","dateModified":"2023-06-26T01:11:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-gives-watch-series-3-users-false-sense-of-security-patching-1-vulnerability\/#webpage"},"wordCount":1429,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-gives-watch-series-3-users-false-sense-of-security-patching-1-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/Apple-Watch-Series-3-headstone-graveyard-400x260-1.jpg","keywords":["Apple Watch","Series 3 Apple Watch","watchOS"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-gives-watch-series-3-users-false-sense-of-security-patching-1-vulnerability\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/Apple-Watch-Series-3-headstone-graveyard-400x260-1.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-pA7","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/98339"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=98339"}],"version-history":[{"count":8,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/98339\/revisions"}],"predecessor-version":[{"id":98374,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/98339\/revisions\/98374"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/97470"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=98339"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=98339"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=98339"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}