{"id":98499,"date":"2023-07-13T21:13:58","date_gmt":"2023-07-14T04:13:58","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=98499"},"modified":"2023-07-27T00:18:02","modified_gmt":"2023-07-27T07:18:02","slug":"apples-second-rapid-security-response-for-macos-ios-and-its-re-release","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/apples-second-rapid-security-response-for-macos-ios-and-its-re-release\/","title":{"rendered":"Apple&#8217;s second Rapid Security Response for macOS, iOS (and its re-release)"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter wp-image-97895 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/Apple-software-update-red-critical-urgent-Rapid-Security-Response-600x300-1.jpg\" alt=\"\" width=\"600\" height=\"300\" \/><\/p>\n<p>On Monday, July 10, Apple released its second-ever series of Rapid Security Response (RSR) updates for macOS Ventura, iOS 16, and iPadOS 16, to address an &#8220;actively exploited&#8221; vulnerability.<\/p>\n<p>But shortly after the updates began to roll out, Apple halted them due to reports of breaking some popular Web sites.<\/p>\n<p>Apple re-issued the update on Wednesday, July 12, which both patches the original vulnerability and resolves the bug that was introduced in the July 10 releases of the RSR.<\/p>\n<p>Let&#8217;s break down everything we know about these updates, and why you should install them urgently.<\/p>\n<p><em>In this article:<\/em><\/p>\n<ul>\n<li><a href=\"#0d\">Apple addresses WebKit zero-day vulnerability in July 10 RSR<\/a><\/li>\n<li><a href=\"#a\">What went wrong with the &#8220;(a)&#8221; versions of the RSR?<\/a><\/li>\n<li><a href=\"#c\">Apple re-releases the RSR on July 12 as &#8220;(c)&#8221; versions<\/a><\/li>\n<li><a href=\"#howget\">How to get the Rapid Security Response update<\/a><\/li>\n<li><a href=\"#saf\">macOS Monterey and macOS Big Sur also got Safari 16.5.2 updates<\/a><\/li>\n<li><a href=\"#wat\">What about watchOS, tvOS, and other Apple OSes?<\/a><\/li>\n<li><a href=\"#keys\">Key takeaways<\/a><\/li>\n<li><a href=\"#learnmore\">How can I learn more?<\/a><a name=\"0d\"><\/a><\/li>\n<\/ul>\n<h3>Apple addresses WebKit zero-day vulnerability in July 10 RSR<\/h3>\n<p>Apple addressed <strong>one &#8220;actively exploited&#8221; (i.e. in-the-wild) vulnerability<\/strong> in this week&#8217;s updates. The WebKit vulnerability (CVE-2023-37450) was addressed for all supported versions of macOS (Ventura, Monterey, and Big Sur), as well as iOS 16 and iPadOS 16.<\/p>\n<blockquote><p><strong>WebKit<\/strong><\/p>\n<p>Impact: Processing web content may lead to arbitrary code execution. <span style=\"color: #ff0000;\">Apple is aware of a report that this issue may have been actively exploited.<\/span><\/p>\n<p>Description: The issue was addressed with improved checks.<\/p>\n<p>CVE-2023-37450: an anonymous researcher<\/p><\/blockquote>\n<p>Unsurprisingly, given that the vulnerability was reported by an anonymous researcher, little else is known about this WebKit bug. No additional details are currently available from third parties.<a name=\"a\"><\/a><\/p>\n<h3>What went wrong with the &#8220;(a)&#8221; versions of the RSR?<\/h3>\n<p>Apple&#8217;s initial &#8220;(a)&#8221; RSR patches <a href=\"https:\/\/arstechnica.com\/security\/2023\/07\/apple-releases-quickly-pulls-rapid-security-response-update-for-0-day-webkit-bug\/\" target=\"_blank\" rel=\"noopener\">reportedly<\/a> included an odd User Agent string, which caused a handful of popular sites to not render correctly. This reportedly included several Meta properties (Facebook, Instagram, and WhatsApp) as well as Zoom.<\/p>\n<p>Every browser has a User Agent string that identifies itself to sites you visit, so sites can offer a version of the page most appropriate for that specific browser.<\/p>\n<p>Within an hour or two of starting to roll out its second RSR, Apple pulled down the update, and it was no longer available to devices that hadn&#8217;t installed it yet.<\/p>\n<p>An <a href=\"https:\/\/support.apple.com\/en-us\/HT213827\" target=\"_blank\" rel=\"noopener\">Apple support page<\/a> suggested removing the &#8220;(a)&#8221; version patches for users who were having trouble. Apple advised waiting for &#8220;(b)&#8221; versions which would supposedly be available soon to address the newly introduced bug and re-patch the vulnerability.<a name=\"c\"><\/a><\/p>\n<h3>Apple re-releases the RSR on July 12 as &#8220;(c)&#8221; versions<\/h3>\n<p>On Wednesday, July 12, Apple re-released the Rapid Security Response as <a href=\"https:\/\/support.apple.com\/en-us\/HT213825\" target=\"_blank\" rel=\"noopener\">macOS Ventura 13.4.1 (c)<\/a>, <a href=\"https:\/\/support.apple.com\/en-us\/HT213823\" target=\"_blank\" rel=\"noopener\">iOS 16.5.1 (c), and iPadOS 16.5.1 (c)<\/a>.<\/p>\n<p>It&#8217;s unclear why Apple skipped the &#8220;(b)&#8221; designation that it claimed it would use for the re-release. Perhaps a &#8220;(b)&#8221; release was used in internal testing and turned out to not work as intended, so Apple opted to use a different moniker for the public re-issuance.<a name=\"howget\"><\/a><\/p>\n<h3>How to get the Rapid Security Response update<\/h3>\n<p>There have not been any common problems with the &#8220;(c)&#8221; versions of this Rapid Security Response, so now is the best time to install the updates, if you haven&#8217;t already done so.<\/p>\n<p>Users of macOS Ventura can get this update by going to <strong>System Settings<\/strong> &gt; <strong>General<\/strong> &gt; <strong>Software Update<\/strong>.<\/p>\n<p>If your Mac is running macOS Mojave, Catalina, Big Sur, or Monterey, and your Mac is compatible with macOS Ventura, you must first upgrade to macOS Ventura by going to <strong>System Preferences<\/strong> &gt; <strong>Software Update<\/strong>. If your Mac is running macOS High Sierra or older and is compatible with macOS Ventura, look for macOS Ventura in the Mac App Store and download it from there. After installing the latest version of macOS Ventura, check for updates again to get the RSR.<\/p>\n<p>If you have an iPhone\u00a0with iOS 16 or an iPad with iPadOS 16, you can also get the update by going to <strong>Settings<\/strong> &gt; <strong>General<\/strong> &gt; <strong>Software Update<\/strong>.<\/p>\n<p>If your device still has iOS or iPadOS 15 installed and it&#8217;s compatible with 16, you&#8217;ll need to first upgrade to the latest version of 16 and then check again for the RSR.<\/p>\n<p>After installing the update, the OS version number will include &#8220;(c)&#8221; at the end, as follows:<\/p>\n<ul>\n<li>macOS Ventura 13.4.1 (c)<\/li>\n<li>iOS 16.5.1 (c)<\/li>\n<li>iPadOS 16.5.1 (c)<\/li>\n<\/ul>\n<p>Notably, older versions of Apple&#8217;s operating systems do not support the Rapid Security Response feature.<a name=\"saf\"><\/a><a name=\"mont\"><\/a><a name=\"bs\"><\/a><\/p>\n<h3>macOS Monterey and macOS Big Sur also got Safari 16.5.2 updates<\/h3>\n<p>Interestingly, Apple released <a href=\"https:\/\/support.apple.com\/en-us\/HT213826\" target=\"_blank\" rel=\"noopener\">Safari 16.5.2 for macOS Monterey and macOS Big Sur<\/a> in tandem with the Rapid Security Response. The first time Apple released an RSR, on May 1, the company waited until May 18 before patching the two actively exploited WebKit vulnerabilities for the two previous macOS versions.<\/p>\n<p>The update is available in <strong>System Preferences<\/strong> &gt;<strong> Software Update<\/strong> on Macs running macOS Monterey or macOS Big Sur.<\/p>\n<p>It&#8217;s important to note that, while Apple released this security update simultaneously with the RSR, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-potentially-make-users-security-and-privacy-precarious\/\">Apple has a history of not always patching some vulnerabilities<\/a> for previous macOS versions. Additionally, even when Apple does patch vulnerabilities in older macOS versions, it often does so after a seemingly arbitrary delay. For maximum security, therefore, it&#8217;s critical to stay on the latest version of macOS at all times.<a name=\"wat\"><\/a><a name=\"8\"><\/a><a name=\"15\"><\/a><a name=\"tv\"><\/a><a name=\"hom\"><\/a><a name=\"display\"><\/a><\/p>\n<h3>What about watchOS, tvOS, and other Apple OSes?<\/h3>\n<p>Apple&#8217;s other operating systems, which also include WebKit, have not been patched yet.<\/p>\n<p>Other operating systems that might be impacted by the actively exploited WebKit vulnerability may include watchOS 9 and tvOS 16.<\/p>\n<p>Apple sometimes releases incomplete patches for iOS 15 and iPadOS 15. As recently as January 2023, Apple even released a patch for iOS 12, although that may have been the final incomplete patch for the very outdated OS. The company has also released <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-gives-watch-series-3-users-false-sense-of-security-patching-1-vulnerability\/\" target=\"_blank\" rel=\"noopener\">a single patch for a single vulnerability in watchOS 8<\/a> for Apple Watch Series 3 while leaving other actively exploited vulnerabilities unpatched.<a name=\"keys\"><\/a><\/p>\n<h3>Key takeaways<\/h3>\n<p>If you get nothing else out of this article, here are some key points:<\/p>\n<ul>\n<li>Apple released urgent security updates this week; <strong>check for and install updates on your Macs, iPhones, and iPads<\/strong>\u00a0as soon as possible.<\/li>\n<li>At this point, <strong>macOS Ventura, iOS 16, and iPadOS 16 are the only safe operating systems<\/strong> to use on Macs, iPhones, and iPads, respectively.\n<ul>\n<li>If you have a Mac for which Apple doesn&#8217;t officially support Ventura, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-keep-older-macs-secure-a-geeky-approach\/\">you may be able to upgrade it anyway<\/a>.<\/li>\n<li>If you have an older iPhone or iPad that isn&#8217;t compatible with 16.x, or any model of the discontinued iPod touch, buying a new device is the safest option.<\/li>\n<\/ul>\n<\/li>\n<li>Watch for possible updates for watchOS 9 and tvOS 16 (and perhaps for older versions of iOS or watchOS\u2014although that&#8217;s far from guaranteed) in the coming weeks.<\/li>\n<\/ul>\n<p>It is advisable to update to the latest operating systems as soon as you reasonably can, especially when Apple either releases a Rapid Security Response or warns that there are &#8220;actively exploited&#8221; vulnerabilities in the wild. It&#8217;s important to get the benefits of new security fixes as quickly as possible to help you stay protected from hackers and malware.<\/p>\n<p>If you have a Mac running macOS Monterey or Big Sur that&#8217;s compatible with Ventura, you may wish to update to the current Monterey or Big Sur version for now, and then as soon as practical, upgrade to macOS Ventura. <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-potentially-make-users-security-and-privacy-precarious\/\">Here&#8217;s why.<\/a> Generally speaking, it is best to upgrade to the latest Apple OS versions quickly for security reasons. For maximum security, one cannot rely on any minimal security patches Apple may release for previous OS versions.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"2WWEOqGLL8\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-potentially-make-users-security-and-privacy-precarious\/\">Apple&#8217;s Poor Patching Policies Potentially Make Users&#8217; Security and Privacy Precarious<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Apple&#8217;s Poor Patching Policies Potentially Make Users&#8217; Security and Privacy Precarious&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-potentially-make-users-security-and-privacy-precarious\/embed\/#?secret=2WWEOqGLL8\" data-secret=\"2WWEOqGLL8\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>Whenever you&#8217;re preparing to update iOS, iPadOS, or macOS, always back up your data before installing any updates. This gives you a restore point if something does not go as planned.<\/p>\n<p>See also our article on <a href=\"https:\/\/www.intego.com\/mac-security-blog\/should-you-back-up-your-ios-device-to-icloud-or-itunes\/\">how to back up your iPhone or iPad to iCloud and to your Mac<\/a>.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"ScKk6rdlBA\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/should-you-back-up-your-ios-device-to-icloud-or-itunes\/\">Should you back up your iPhone to iCloud or your Mac? Here&#8217;s how to do both<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Should you back up your iPhone to iCloud or your Mac? Here&#8217;s how to do both&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/should-you-back-up-your-ios-device-to-icloud-or-itunes\/embed\/#?secret=ScKk6rdlBA\" data-secret=\"ScKk6rdlBA\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>See also our related article on <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-verify-your-backups-are-working-properly\/\">how to check your macOS backups to ensure they work correctly<\/a>.<a name=\"learnmore\"><\/a><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"YsPPEm1ign\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-verify-your-backups-are-working-properly\/\">How to Verify Your Backups are Working Properly<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;How to Verify Your Backups are Working Properly&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-verify-your-backups-are-working-properly\/embed\/#?secret=YsPPEm1ign\" data-secret=\"YsPPEm1ign\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<h3>How can I learn more?<\/h3>\n<p>On episodes <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apples-bungled-rapid-security-response-intego-mac-podcast-episode-300\/\">300<\/a> and <a href=\"https:\/\/www.intego.com\/mac-security-blog\/shadowvault-wormgpt-and-apples-re-released-rapid-security-response-intego-mac-podcast-episode-301\/\">301<\/a> of the Intego Mac Podcast, we talked about the initial and re-released versions of Apple&#8217;s second Rapid Security Response, respectively.<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/player.fireside.fm\/v2\/GegHgcrH+g__hd-Aa?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, including security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Twitter-logo-icon-64.png\" alt=\"Follow Intego on Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Facebook-logo-icon-64.png\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/YouTube-logo-icon-64.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Pinterest-logo-icon-64.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/LinkedIn-logo-icon-64.png\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Instagram-logo-icon-64.png\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>On July 10 and July 12, Apple released and re-released its second round of Rapid Security Response updates for macOS Ventura, iOS 16, and iPadOS 16, to address an actively exploited vulnerability.<\/p>\n<p>But shortly after the updates began to roll out, Apple halted them due to reports of breaking some popular Web sites.<\/p>\n<p>Apple re-issued the update on Wednesday, July 12, which both patches the original vulnerability and resolves the bug that was introduced in the July 10 releases of the RSR.<\/p>\n","protected":false},"author":14,"featured_media":97898,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[69,4645,4564,3175,4589,4618,4643,115,201],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"On July 10 and July 12, Apple released and re-released its second round of Rapid Security Response updates for macOS Ventura, iOS 16, and iPadOS 16, to address an actively exploited vulnerability.  But shortly after the updates began to roll out, Apple halted them due to reports of breaking some popular Web sites.  Apple re-issued the update on Wednesday, July 12, which both patches the original vulnerability and resolves the bug that was introduced in the July 10 releases of the RSR.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apples-second-rapid-security-response-for-macos-ios-and-its-re-release\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple&#039;s second Rapid Security Response for macOS, iOS (and its re-release) - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"On July 10 and July 12, Apple released and re-released its second round of Rapid Security Response updates for macOS Ventura, iOS 16, and iPadOS 16, to address an actively exploited vulnerability.  But shortly after the updates began to roll out, Apple halted them due to reports of breaking some popular Web sites.  Apple re-issued the update on Wednesday, July 12, which both patches the original vulnerability and resolves the bug that was introduced in the July 10 releases of the RSR.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/apples-second-rapid-security-response-for-macos-ios-and-its-re-release\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-14T04:13:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-27T07:18:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/Apple-software-update-red-critical-urgent-Rapid-Security-Response-400x260-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-second-rapid-security-response-for-macos-ios-and-its-re-release\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/Apple-software-update-red-critical-urgent-Rapid-Security-Response-400x260-1.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/Apple-software-update-red-critical-urgent-Rapid-Security-Response-400x260-1.jpg\",\"width\":400,\"height\":260,\"caption\":\"Apple software update red critical urgent actively exploited zero-day vulnerability Rapid Security Response speed dust cloud poof\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-second-rapid-security-response-for-macos-ios-and-its-re-release\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-second-rapid-security-response-for-macos-ios-and-its-re-release\/\",\"name\":\"Apple's second Rapid Security Response for macOS, iOS (and its re-release) - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-second-rapid-security-response-for-macos-ios-and-its-re-release\/#primaryimage\"},\"datePublished\":\"2023-07-14T04:13:58+00:00\",\"dateModified\":\"2023-07-27T07:18:02+00:00\",\"description\":\"On July 10 and July 12, Apple released and re-released its second round of Rapid Security Response updates for macOS Ventura, iOS 16, and iPadOS 16, to address an actively exploited vulnerability. But shortly after the updates began to roll out, Apple halted them due to reports of breaking some popular Web sites. Apple re-issued the update on Wednesday, July 12, which both patches the original vulnerability and resolves the bug that was introduced in the July 10 releases of the RSR.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-second-rapid-security-response-for-macos-ios-and-its-re-release\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apples-second-rapid-security-response-for-macos-ios-and-its-re-release\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-second-rapid-security-response-for-macos-ios-and-its-re-release\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple&#8217;s second Rapid Security Response for macOS, iOS (and its re-release)\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-second-rapid-security-response-for-macos-ios-and-its-re-release\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-second-rapid-security-response-for-macos-ios-and-its-re-release\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Apple&#8217;s second Rapid Security Response for macOS, iOS (and its re-release)\",\"datePublished\":\"2023-07-14T04:13:58+00:00\",\"dateModified\":\"2023-07-27T07:18:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-second-rapid-security-response-for-macos-ios-and-its-re-release\/#webpage\"},\"wordCount\":1437,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-second-rapid-security-response-for-macos-ios-and-its-re-release\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/Apple-software-update-red-critical-urgent-Rapid-Security-Response-400x260-1.jpg\",\"keywords\":[\"iOS\",\"iOS 16\",\"iPadOS\",\"macOS\",\"macOS Big Sur\",\"macOS Monterey\",\"macOS Ventura\",\"Safari\",\"Security Updates\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apples-second-rapid-security-response-for-macos-ios-and-its-re-release\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"On July 10 and July 12, Apple released and re-released its second round of Rapid Security Response updates for macOS Ventura, iOS 16, and iPadOS 16, to address an actively exploited vulnerability.  But shortly after the updates began to roll out, Apple halted them due to reports of breaking some popular Web sites.  Apple re-issued the update on Wednesday, July 12, which both patches the original vulnerability and resolves the bug that was introduced in the July 10 releases of the RSR.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/apples-second-rapid-security-response-for-macos-ios-and-its-re-release\/","og_locale":"en_US","og_type":"article","og_title":"Apple's second Rapid Security Response for macOS, iOS (and its re-release) - The Mac Security Blog","og_description":"On July 10 and July 12, Apple released and re-released its second round of Rapid Security Response updates for macOS Ventura, iOS 16, and iPadOS 16, to address an actively exploited vulnerability.  But shortly after the updates began to roll out, Apple halted them due to reports of breaking some popular Web sites.  Apple re-issued the update on Wednesday, July 12, which both patches the original vulnerability and resolves the bug that was introduced in the July 10 releases of the RSR.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/apples-second-rapid-security-response-for-macos-ios-and-its-re-release\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2023-07-14T04:13:58+00:00","article_modified_time":"2023-07-27T07:18:02+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/Apple-software-update-red-critical-urgent-Rapid-Security-Response-400x260-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-second-rapid-security-response-for-macos-ios-and-its-re-release\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/Apple-software-update-red-critical-urgent-Rapid-Security-Response-400x260-1.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/Apple-software-update-red-critical-urgent-Rapid-Security-Response-400x260-1.jpg","width":400,"height":260,"caption":"Apple software update red critical urgent actively exploited zero-day vulnerability Rapid Security Response speed dust cloud poof"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-second-rapid-security-response-for-macos-ios-and-its-re-release\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/apples-second-rapid-security-response-for-macos-ios-and-its-re-release\/","name":"Apple's second Rapid Security Response for macOS, iOS (and its re-release) - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-second-rapid-security-response-for-macos-ios-and-its-re-release\/#primaryimage"},"datePublished":"2023-07-14T04:13:58+00:00","dateModified":"2023-07-27T07:18:02+00:00","description":"On July 10 and July 12, Apple released and re-released its second round of Rapid Security Response updates for macOS Ventura, iOS 16, and iPadOS 16, to address an actively exploited vulnerability. But shortly after the updates began to roll out, Apple halted them due to reports of breaking some popular Web sites. Apple re-issued the update on Wednesday, July 12, which both patches the original vulnerability and resolves the bug that was introduced in the July 10 releases of the RSR.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-second-rapid-security-response-for-macos-ios-and-its-re-release\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/apples-second-rapid-security-response-for-macos-ios-and-its-re-release\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-second-rapid-security-response-for-macos-ios-and-its-re-release\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Apple&#8217;s second Rapid Security Response for macOS, iOS (and its re-release)"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-second-rapid-security-response-for-macos-ios-and-its-re-release\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-second-rapid-security-response-for-macos-ios-and-its-re-release\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Apple&#8217;s second Rapid Security Response for macOS, iOS (and its re-release)","datePublished":"2023-07-14T04:13:58+00:00","dateModified":"2023-07-27T07:18:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-second-rapid-security-response-for-macos-ios-and-its-re-release\/#webpage"},"wordCount":1437,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-second-rapid-security-response-for-macos-ios-and-its-re-release\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/Apple-software-update-red-critical-urgent-Rapid-Security-Response-400x260-1.jpg","keywords":["iOS","iOS 16","iPadOS","macOS","macOS Big Sur","macOS Monterey","macOS Ventura","Safari","Security Updates"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/apples-second-rapid-security-response-for-macos-ios-and-its-re-release\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/05\/Apple-software-update-red-critical-urgent-Rapid-Security-Response-400x260-1.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-pCH","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/98499"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=98499"}],"version-history":[{"count":4,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/98499\/revisions"}],"predecessor-version":[{"id":98538,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/98499\/revisions\/98538"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/97898"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=98499"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=98499"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=98499"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}