{"id":98534,"date":"2023-07-27T01:28:10","date_gmt":"2023-07-27T08:28:10","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=98534"},"modified":"2023-07-27T01:28:10","modified_gmt":"2023-07-27T08:28:10","slug":"urgent-macos-ventura-13-5-ios-16-6-etc-fix-major-kernel-vulnerability","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/urgent-macos-ventura-13-5-ios-16-6-etc-fix-major-kernel-vulnerability\/","title":{"rendered":"Urgent: macOS Ventura 13.5, iOS 16.6, etc. fix major kernel vulnerability"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-97208\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-600x300-1.png\" alt=\"\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-600x300-1.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-600x300-1-300x150.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-600x300-1-150x75.png 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>On Monday, July 24, Apple released updates to its current operating systems as well as a few older ones. The updates fixed some bugs as well as security vulnerabilities\u2014including &#8220;actively exploited&#8221; vulnerabilities.<\/p>\n<p>Let&#8217;s take a look at some of the highlights of these updates.<\/p>\n<p><em>In this article:<\/em><\/p>\n<ul>\n<li><a href=\"#0d\">Apple addresses zero-day vulnerabilities<\/a><\/li>\n<li><a href=\"#vent\">macOS Ventura 13.5<\/a><\/li>\n<li><a href=\"#mont\">macOS Monterey 12.6.8<\/a><\/li>\n<li><a href=\"#bs\">macOS Big Sur 11.7.9<\/a><\/li>\n<li><a href=\"#saf\">Safari 16.6 for macOS Monterey and Big Sur<\/a><\/li>\n<li><a href=\"#16\">iOS 16.6 and iPadOS 16.6<\/a><\/li>\n<li><a href=\"#15\">iOS 15.7.8 and iPadOS 15.7.8<\/a><\/li>\n<li><a href=\"#wat\">watchOS 9.6<\/a>\n<ul>\n<li><a href=\"#8\">watchOS 8 users spurned once again<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"#tv\">tvOS 16.6<\/a><\/li>\n<li><a href=\"#hom\">audioOS 16.6<\/a><\/li>\n<li><a href=\"#keys\">Key takeaways<\/a><\/li>\n<li><a href=\"#learnmore\">How can I learn more?<\/a><a name=\"0d\"><\/a><\/li>\n<\/ul>\n<h3>Apple addresses zero-day vulnerabilities<\/h3>\n<p>In total, this week&#8217;s patches addressed three vulnerabilities Apple describes as &#8220;actively exploited,&#8221; meaning they are known to have been used in real-world attacks. An &#8220;actively exploited&#8221; vulnerability is also sometimes referred to as a &#8220;zero-day&#8221; or &#8220;in-the-wild&#8221; vulnerability.<\/p>\n<p>Two of the three have previously been addressed in past patches and are now available to more Apple operating systems.<\/p>\n<p>The brand-new &#8220;actively exploited&#8221; vulnerability addressed for the first time in this week&#8217;s updates is a kernel vulnerability named CVE-2023-38606. Based on the information Apple has provided, it appears that this vulnerability may have been used in attacks against iPhones in Russia, as part of the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-vulns-used-to-infect-russian-iphones-with-triangledb-malware\/\">Operation Triangulation attack campaign used to spread TriangleDB iPhone spyware<\/a>.<\/p>\n<blockquote><p><strong>Kernel<br \/>\n<\/strong><\/p>\n<p>Impact: An app may be able to modify sensitive kernel state. <span style=\"color: #ff0000;\">Apple is aware of a report that this issue may have been actively exploited<\/span> against versions of iOS released before iOS 15.7.1.<\/p>\n<p>Description: This issue was addressed with improved state management.<\/p>\n<p>CVE-2023-38606: Valentin Pashkov, Mikhail Vinogradov, Georgy Kucherin (@kucher1n), Leonid Bezvershenko (@bzvr_), and Boris Larin (@oct0xor) of Kaspersky<\/p><\/blockquote>\n<p>Another actively exploited vulnerability\u2014CVE-2023-37450, a WebKit issue <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apples-second-rapid-security-response-for-macos-ios-and-its-re-release\/\">previously addressed in this month&#8217;s Rapid Security Response updates<\/a>\u2014was re-released for the same operating systems, and also brought for the first time to watchOS 9 and tvOS 16. Notably, iOS 15 and iPadOS 15 appear <strong><em>not<\/em><\/strong> to have received patches for this vulnerability.<\/p>\n<blockquote><p><strong>WebKit<\/strong><\/p>\n<p>Impact: Processing web content may lead to arbitrary code execution. <span style=\"color: #ff0000;\">Apple is aware of a report that this issue may have been actively exploited.<\/span><\/p>\n<p>Description: The issue was addressed with improved checks.<\/p>\n<p>CVE-2023-37450: an anonymous researcher<\/p><\/blockquote>\n<p>Finally, iOS 15.7.8 and iPadOS 15.7.8 apparently received a patch for CVE-2023-32409, a WebKit vulnerability that <a href=\"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-4-ios-16-5-fix-3-actively-exploited-vulns\/\">was patched for other Apple operating systems back on May 18<\/a>.<\/p>\n<blockquote><p><strong>WebKit<br \/>\n<\/strong><\/p>\n<p>Impact: A remote attacker may be able to break out of Web Content sandbox. <span style=\"color: #ff0000;\">Apple is aware of a report that this issue may have been actively exploited.<\/span><\/p>\n<p>Description: The issue was addressed with improved bounds checks.<\/p>\n<p>WebKit Bugzilla: 255350<br \/>\nCVE-2023-32409: Cl\u00e9ment Lecigne of Google&#8217;s Threat Analysis Group and Donncha \u00d3 Cearbhaill of Amnesty International\u2019s Security Lab<a name=\"vent\"><\/a><\/p><\/blockquote>\n<h3>macOS Ventura 13.5<\/h3>\n<p><strong>Available for:<\/strong><br \/>\nAll supported Macs currently running macOS Ventura<\/p>\n<p><strong>Update information:<\/strong><\/p>\n<ul>\n<li>This update provides important bug fixes and security updates and is recommended for all users.<\/li>\n<\/ul>\n<p>Apple did not specify which bugs were fixed, nor did it provide any details for enterprise users.<\/p>\n<p><strong>Security-related fixes and updates:<\/strong><br \/>\nAt least 42 vulnerabilities were addressed in this update. Aside from the actively exploited ones discussed earlier, here are a few other interesting ones:<\/p>\n<blockquote><p><strong>AppleMobileFileIntegrity<br \/>\n<\/strong>Impact: An app may be able to determine a user\u2019s current location<br \/>\nDescription: A downgrade issue affecting Intel-based Mac computers was addressed with additional code-signing restrictions.<\/p>\n<p><strong>Assets<br \/>\n<\/strong>Impact: An app may be able to modify protected parts of the file system<br \/>\nDescription: This issue was addressed with improved data protection.<\/p>\n<p><strong>Shortcuts<br \/>\n<\/strong>Impact: A shortcut may be able to modify sensitive Shortcuts app settings<br \/>\nDescription: An access issue was addressed with improved access restrictions.<\/p><\/blockquote>\n<p>Out of all addressed issues, eight were WebKit related and 11 were kernel related. For the full list of security patches included in Ventura 13.5, <a href=\"https:\/\/support.apple.com\/en-us\/HT213843\" target=\"_blank\" rel=\"noopener\">have a look here<\/a>.<\/p>\n<p>You can get this update by going to <strong>System Preferences<\/strong> &gt; <strong>Software Update<\/strong>, where compatible Macs running macOS Mojave or newer will see the Monterey update appear. If your Mac is running macOS High Sierra or older, look for macOS Ventura in the App Store and download it from there.<a name=\"mont\"><\/a><\/p>\n<h3>macOS Monterey 12.6.8<\/h3>\n<p><strong>Available for:<\/strong><br \/>\nAll supported Macs currently running macOS Monterey<\/p>\n<p><strong>Security-related fixes and updates:<\/strong><br \/>\nAt least 22 vulnerabilities were addressed, all of which were addressed in the macOS Ventura update. For the full list of security patches included in Monterey 12.6.8, <a href=\"https:\/\/support.apple.com\/en-us\/HT213844\" target=\"_blank\" rel=\"noopener\">have a look here<\/a>.<\/p>\n<p>You can get this update by going to <strong>System Preferences<\/strong> &gt; <strong>Software Update<\/strong>.<a name=\"bs\"><\/a><\/p>\n<h3>macOS Big Sur 11.7.9<\/h3>\n<p><strong>Available for:<\/strong><br \/>\nAll supported Macs currently running macOS Big Sur<\/p>\n<p><strong>Security-related fixes and updates:<\/strong><br \/>\nAt least 18 vulnerabilities were addressed in this update, all of them the same as those addressed in the macOS Monterey and Ventura updates. For the full list of security patches included in Big Sur 11.7.9, <a href=\"https:\/\/support.apple.com\/en-us\/HT213845\" target=\"_blank\" rel=\"noopener\">have a look here<\/a>.<\/p>\n<p>You can get this update by going to <strong>System Preferences<\/strong> &gt; <strong>Software Update<\/strong>.<a name=\"saf\"><\/a><\/p>\n<h3>Safari 16.6 for macOS Monterey and Big Sur<\/h3>\n<p><strong>Available for:<\/strong><br \/>\nmacOS Big Sur and macOS Monterey.<\/p>\n<p>This update addresses at least seven WebKit issues that were also addressed for macOS Ventura. The short list of fixes <a href=\"https:\/\/support.apple.com\/en-us\/HT213847\" target=\"_blank\" rel=\"noopener\">can be seen here<\/a>, and the update is available to applicable Macs via <strong>System Preferences<\/strong> &gt;<strong> Software Update<\/strong>. It will pop up as an available update once macOS 12.6.8 or 11.7.9 has been installed.<a name=\"16\"><\/a><\/p>\n<h3>iOS 16.6 and iPadOS 16.6<\/h3>\n<p><strong>Available for:<\/strong><br \/>\niPhone 8 and later, iPad Pro (all models), iPad Air 3rd generation and later, iPad 5th generation and later, and iPad mini 5th generation and later<\/p>\n<p><strong>Enterprise:<\/strong><\/p>\n<ul>\n<li>Improves connection reliability in Classroom.<\/li>\n<\/ul>\n<p><strong>Security-related fixes and updates:<\/strong><br \/>\nAt least 25 vulnerabilities were addressed in this update, most of them the same as those addressed in the macOS updates. The full list of security issues that were addressed can be found <a href=\"https:\/\/support.apple.com\/en-us\/HT213841\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/p>\n<p>To get the latest update, you can connect your device to your Mac to back it up and install the update. Alternatively, you can download these updates over the air (i.e. directly onto the device) by going to <strong>Settings<\/strong> &gt; <strong>General<\/strong> &gt; <strong>Software Update<\/strong>\u00a0on your device.<a name=\"15\"><\/a><\/p>\n<h3>iOS 15.7.8 and iPadOS 15.7.8<\/h3>\n<p><strong>Available for:<\/strong><br \/>\niPhone 6s (all models), iPhone 7 (all models), iPhone SE (1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch (7th generation)<\/p>\n<p><strong>Security-related fixes and updates:<\/strong><br \/>\nAt least 11 vulnerabilities were addressed in this update, all of which were either covered in this week&#8217;s or prior iOS 16 updates. The full list of security issues that were addressed can be found <a href=\"https:\/\/support.apple.com\/en-us\/HT213842\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/p>\n<p>To get this update, you can connect your device to your Mac to back it up and install the update. Alternatively, you can\u00a0download these updates over the air by going to <strong>Settings<\/strong> &gt; <strong>General<\/strong> &gt; <strong>Software Update<\/strong> on your device.<a name=\"wat\"><\/a><\/p>\n<h3>watchOS 9.6<\/h3>\n<p><strong>Available for:<\/strong><br \/>\nApple Watch Series 4 and later<\/p>\n<p><strong>Security-related fixes and updates:<br \/>\n<\/strong>At least 18 vulnerabilities were addressed in this update, all of them the same as those covered in the previously mentioned OS updates.<\/p>\n<p>The full list of security issues that were addressed can be found <a href=\"https:\/\/support.apple.com\/en-us\/HT213848\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>. To install this update, make sure your iPhone is up to date first, both your phone and watch are connected to the same Wi-Fi network, and the watch has at least a 50% charge.<a name=\"8\"><\/a> Then open the Watch app on your phone and tap <strong>General<\/strong> &gt; <strong>Software Update<\/strong>.<\/p>\n<h4><strong>watchOS 8 users spurned once again<\/strong><\/h4>\n<p>Meanwhile, Apple has once again left users of <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-stops-selling-watch-series-3-eight-months-after-its-last-security-update\/\">Apple Watch Series 3\u2014which Apple was still selling until mid-March 2023<\/a>\u2014out in the cold with no security updates.<\/p>\n<p>Apple has only patched <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-gives-watch-series-3-users-false-sense-of-security-patching-1-vulnerability\/\">a single vulnerability for watchOS 8 in the past 12 months<\/a>, providing little more than a false sense of security to Apple Watch Series 3 users.<a name=\"tv\"><\/a><\/p>\n<h3>tvOS 16.6<\/h3>\n<div><strong>Available for:<\/strong><br \/>\nApple TV 4K (all models) and Apple TV HD<\/div>\n<p><strong>New Features<\/strong><\/p>\n<ul>\n<li>This update adds Siri support for Hebrew in Israel to help you find shows, music, and more using just your voice, and includes performance and stability improvements.<\/li>\n<\/ul>\n<p><strong>Security-related fixes and updates:<\/strong><br \/>\nAt least 13 vulnerabilities were addressed in this update, all of them the same as those covered in the previously mentioned OS updates.<\/p>\n<p>The full list of security issues that were addressed can be found <a href=\"https:\/\/support.apple.com\/en-us\/HT213846\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<a name=\"hom\"><\/a><\/p>\n<h3>audioOS 16.6<\/h3>\n<p>Apple&#8217;s rarely-mentioned audioOS (also known as HomePod Software, or HomePodOS) was also updated. Apple has never mentioned this operating system on its <a href=\"https:\/\/support.apple.com\/en-us\/HT201222\" target=\"_blank\" rel=\"noopener\">security updates page<\/a>, so it is unclear whether any security issues were addressed in this week&#8217;s update. However, according to the <a href=\"https:\/\/mrmacintosh.com\/macos-ventura-13-5-update-22g74-whats-new\/#:~:text=audioOS\" target=\"_blank\" rel=\"noopener\">Mr. Macintosh blog<\/a>, which keeps track of OS version numbers, the audioOS build numbers match those of tvOS, which seems to imply that the HomePod runs essentially the same operating system as the Apple TV.<\/p>\n<p>HomePod updates are generally not urgent, and they are supposed to install automatically. However, if you would like to update your HomePod or HomePod mini&#8217;s operating system manually, you can go into the <strong>Home<\/strong> app on your iPhone or iPad, then tap the\u00a0<strong>House icon<\/strong> &gt; <strong>Home Settings<\/strong> &gt;<strong> Software Update<\/strong> &gt; temporarily disable (toggle off) <strong>Install Updates Automatically<\/strong> &gt; then tap <strong>Install<\/strong>. After updating, remember to <strong>re-enable the Install Updates Automatically<\/strong> setting.<a name=\"keys\"><\/a><\/p>\n<h3>Key takeaways<\/h3>\n<p>If you get nothing else out of this article, here are some key points:<\/p>\n<ul>\n<li>Apple released urgent security updates this week; <strong>check for and install updates on your Macs, iPhones, iPads, and other Apple devices<\/strong> as soon as possible.<\/li>\n<li>At this point, <strong>macOS Ventura, iOS 16, iPadOS 16, and watchOS 9 are the only safe operating systems<\/strong> to use on Macs, iPhones, iPads, and Apple Watches, respectively.\n<ul>\n<li>If you have a Mac for which Apple doesn&#8217;t officially support Ventura, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-keep-older-macs-secure-a-geeky-approach\/\">you may be able to upgrade it anyway<\/a>.<\/li>\n<li>If you have an older iPhone or iPad that isn&#8217;t compatible with 16.x, or any iPod touch, buying a new device is the safest option.<\/li>\n<li>If you have an Apple Watch Series 3 or earlier, buying a new Apple Watch is the safest option.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>All operating systems mentioned in this article received a fix for the new &#8220;actively exploited&#8221; kernel vulnerability identified as CVE-2023-38606. However, the actively exploited WebKit vulnerability known as CVE-2023-37450\u2014which was originally addressed by <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apples-second-rapid-security-response-for-macos-ios-and-its-re-release\/\">the Rapid Security Response earlier this month<\/a>\u2014evidently remains unpatched in iOS 15.7.8 and iPadOS 15.7.8, as well as <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-gives-watch-series-3-users-false-sense-of-security-patching-1-vulnerability\/\">watchOS 8.8.1 (the latest watchOS available for the Apple Watch Series 3)<\/a>.<\/p>\n<p>It is advisable to update to the latest operating systems as soon as you reasonably can, especially when Apple releases a Rapid Security Response or otherwise warns that there are &#8220;actively exploited&#8221; vulnerabilities in the wild. It&#8217;s important to get the benefits of new security fixes as quickly as possible to help you stay protected from hackers and malware.<\/p>\n<p>If you have a Mac running macOS Monterey or Big Sur that&#8217;s compatible with Ventura, you may wish to update to the current Monterey or Big Sur version, and then as soon as practical, upgrade to macOS Ventura. <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-potentially-make-users-security-and-privacy-precarious\/\">Here&#8217;s why.<\/a> Generally speaking, it is best to upgrade to the latest Apple OS versions quickly for security reasons. For maximum security, one cannot rely on any minimal security patches Apple may release for previous OS versions.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"FYFAFiALpi\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-potentially-make-users-security-and-privacy-precarious\/\">Apple&#8217;s Poor Patching Policies Potentially Make Users&#8217; Security and Privacy Precarious<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Apple&#8217;s Poor Patching Policies Potentially Make Users&#8217; Security and Privacy Precarious&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-potentially-make-users-security-and-privacy-precarious\/embed\/#?secret=FYFAFiALpi\" data-secret=\"FYFAFiALpi\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>If your Mac does not officially support the latest macOS version, you may be able to <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-keep-older-macs-secure-a-geeky-approach\/\">upgrade it anyway<\/a>.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"wtY8PO9VLz\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-keep-older-macs-secure-a-geeky-approach\/\">How to Install macOS Ventura or Sonoma on Unsupported Macs, for Security Improvements<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;How to Install macOS Ventura or Sonoma on Unsupported Macs, for Security Improvements&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-keep-older-macs-secure-a-geeky-approach\/embed\/#?secret=wtY8PO9VLz\" data-secret=\"wtY8PO9VLz\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>If your Mac is old, but if you&#8217;re unwilling to take the unofficial macOS upgrade route (or if your Mac is so old that it can&#8217;t even get macOS upgrades through unsupported means), and you absolutely <em>have to<\/em> use it online and accept the risks of doing so, you may want to <a href=\"https:\/\/www.intego.com\/mac-security-blog\/firefox-to-stop-macos-mojave-windows-7-8-updates-heres-why-thats-a-good-thing\/#palemoon\" target=\"_blank\" rel=\"noopener\">consider using the Pale Moon browser<\/a> rather than Safari. Pale Moon, a close relative of Firefox, works with macOS versions all the way back to OS X 10.7 Lion, and it continues to incorporate the latest Firefox security updates where applicable.<\/p>\n<p>Whenever you&#8217;re preparing to update iOS, iPadOS, or macOS, <strong>always back up your data before installing any updates<\/strong>. This gives you a restore point if something does not go as planned.<\/p>\n<p>See also our related article on <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-verify-your-backups-are-working-properly\/\">how to check your macOS backups to ensure they work correctly<\/a>.<a name=\"learnmore\"><\/a><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"wWw193ONxM\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-verify-your-backups-are-working-properly\/\">How to Verify Your Backups are Working Properly<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;How to Verify Your Backups are Working Properly&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-verify-your-backups-are-working-properly\/embed\/#?secret=wWw193ONxM\" data-secret=\"wWw193ONxM\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<h3>How can I learn more?<\/h3>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, including security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Twitter-logo-icon-64.png\" alt=\"Follow Intego on Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Facebook-logo-icon-64.png\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/YouTube-logo-icon-64.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Pinterest-logo-icon-64.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/LinkedIn-logo-icon-64.png\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Instagram-logo-icon-64.png\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>On Monday, July 24, Apple released OS updates to address a major kernel vulnerability that has been used in the wild to install malware on iPhones, as well as two other actively exploited vulnerabilities.<\/p>\n","protected":false},"author":79,"featured_media":97207,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[24,69,4627,4645,3175,4618,4694,4583],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"On Monday, July 24, Apple released OS updates to address a major kernel vulnerability that has been used in the wild to install malware on iPhones, as well as two other actively exploited vulnerabilities.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/urgent-macos-ventura-13-5-ios-16-6-etc-fix-major-kernel-vulnerability\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Urgent: macOS Ventura 13.5, iOS 16.6, etc. fix major kernel vulnerability - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"On Monday, July 24, Apple released OS updates to address a major kernel vulnerability that has been used in the wild to install malware on iPhones, as well as two other actively exploited vulnerabilities.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/urgent-macos-ventura-13-5-ios-16-6-etc-fix-major-kernel-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-27T08:28:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-400x260-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jay Vrijenhoek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/urgent-macos-ventura-13-5-ios-16-6-etc-fix-major-kernel-vulnerability\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-400x260-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-400x260-1.png\",\"width\":400,\"height\":260,\"caption\":\"Apple software update red critical urgent actively exploited zero-day vulnerability\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/urgent-macos-ventura-13-5-ios-16-6-etc-fix-major-kernel-vulnerability\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/urgent-macos-ventura-13-5-ios-16-6-etc-fix-major-kernel-vulnerability\/\",\"name\":\"Urgent: macOS Ventura 13.5, iOS 16.6, etc. fix major kernel vulnerability - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/urgent-macos-ventura-13-5-ios-16-6-etc-fix-major-kernel-vulnerability\/#primaryimage\"},\"datePublished\":\"2023-07-27T08:28:10+00:00\",\"dateModified\":\"2023-07-27T08:28:10+00:00\",\"description\":\"On Monday, July 24, Apple released OS updates to address a major kernel vulnerability that has been used in the wild to install malware on iPhones, as well as two other actively exploited vulnerabilities.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/urgent-macos-ventura-13-5-ios-16-6-etc-fix-major-kernel-vulnerability\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/urgent-macos-ventura-13-5-ios-16-6-etc-fix-major-kernel-vulnerability\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/urgent-macos-ventura-13-5-ios-16-6-etc-fix-major-kernel-vulnerability\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Urgent: macOS Ventura 13.5, iOS 16.6, etc. fix major kernel vulnerability\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/urgent-macos-ventura-13-5-ios-16-6-etc-fix-major-kernel-vulnerability\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/urgent-macos-ventura-13-5-ios-16-6-etc-fix-major-kernel-vulnerability\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\"},\"headline\":\"Urgent: macOS Ventura 13.5, iOS 16.6, etc. fix major kernel vulnerability\",\"datePublished\":\"2023-07-27T08:28:10+00:00\",\"dateModified\":\"2023-07-27T08:28:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/urgent-macos-ventura-13-5-ios-16-6-etc-fix-major-kernel-vulnerability\/#webpage\"},\"wordCount\":2070,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/urgent-macos-ventura-13-5-ios-16-6-etc-fix-major-kernel-vulnerability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-400x260-1.png\",\"keywords\":[\"Apple TV\",\"iOS\",\"iOS 15\",\"iOS 16\",\"macOS\",\"macOS Monterey\",\"TriangleDB\",\"watchOS\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/urgent-macos-ventura-13-5-ios-16-6-etc-fix-major-kernel-vulnerability\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\",\"name\":\"Jay Vrijenhoek\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"caption\":\"Jay Vrijenhoek\"},\"description\":\"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"On Monday, July 24, Apple released OS updates to address a major kernel vulnerability that has been used in the wild to install malware on iPhones, as well as two other actively exploited vulnerabilities.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/urgent-macos-ventura-13-5-ios-16-6-etc-fix-major-kernel-vulnerability\/","og_locale":"en_US","og_type":"article","og_title":"Urgent: macOS Ventura 13.5, iOS 16.6, etc. fix major kernel vulnerability - The Mac Security Blog","og_description":"On Monday, July 24, Apple released OS updates to address a major kernel vulnerability that has been used in the wild to install malware on iPhones, as well as two other actively exploited vulnerabilities.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/urgent-macos-ventura-13-5-ios-16-6-etc-fix-major-kernel-vulnerability\/","og_site_name":"The Mac Security Blog","article_published_time":"2023-07-27T08:28:10+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-400x260-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jay Vrijenhoek","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/urgent-macos-ventura-13-5-ios-16-6-etc-fix-major-kernel-vulnerability\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-400x260-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-400x260-1.png","width":400,"height":260,"caption":"Apple software update red critical urgent actively exploited zero-day vulnerability"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/urgent-macos-ventura-13-5-ios-16-6-etc-fix-major-kernel-vulnerability\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/urgent-macos-ventura-13-5-ios-16-6-etc-fix-major-kernel-vulnerability\/","name":"Urgent: macOS Ventura 13.5, iOS 16.6, etc. fix major kernel vulnerability - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/urgent-macos-ventura-13-5-ios-16-6-etc-fix-major-kernel-vulnerability\/#primaryimage"},"datePublished":"2023-07-27T08:28:10+00:00","dateModified":"2023-07-27T08:28:10+00:00","description":"On Monday, July 24, Apple released OS updates to address a major kernel vulnerability that has been used in the wild to install malware on iPhones, as well as two other actively exploited vulnerabilities.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/urgent-macos-ventura-13-5-ios-16-6-etc-fix-major-kernel-vulnerability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/urgent-macos-ventura-13-5-ios-16-6-etc-fix-major-kernel-vulnerability\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/urgent-macos-ventura-13-5-ios-16-6-etc-fix-major-kernel-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Urgent: macOS Ventura 13.5, iOS 16.6, etc. fix major kernel vulnerability"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/urgent-macos-ventura-13-5-ios-16-6-etc-fix-major-kernel-vulnerability\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/urgent-macos-ventura-13-5-ios-16-6-etc-fix-major-kernel-vulnerability\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0"},"headline":"Urgent: macOS Ventura 13.5, iOS 16.6, etc. fix major kernel vulnerability","datePublished":"2023-07-27T08:28:10+00:00","dateModified":"2023-07-27T08:28:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/urgent-macos-ventura-13-5-ios-16-6-etc-fix-major-kernel-vulnerability\/#webpage"},"wordCount":2070,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/urgent-macos-ventura-13-5-ios-16-6-etc-fix-major-kernel-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-400x260-1.png","keywords":["Apple TV","iOS","iOS 15","iOS 16","macOS","macOS Monterey","TriangleDB","watchOS"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/urgent-macos-ventura-13-5-ios-16-6-etc-fix-major-kernel-vulnerability\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0","name":"Jay Vrijenhoek","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","caption":"Jay Vrijenhoek"},"description":"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.","url":"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-400x260-1.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-pDg","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/98534"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/79"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=98534"}],"version-history":[{"count":3,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/98534\/revisions"}],"predecessor-version":[{"id":98542,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/98534\/revisions\/98542"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/97207"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=98534"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=98534"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=98534"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}