	{"id":98922,"date":"2023-09-22T23:59:25","date_gmt":"2023-09-23T06:59:25","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=98922"},"modified":"2023-09-27T08:00:43","modified_gmt":"2023-09-27T15:00:43","slug":"apple-patches-predator-exploited-vulnerabilities-for-ios-ipados-macos-watchos","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-predator-exploited-vulnerabilities-for-ios-ipados-macos-watchos\/","title":{"rendered":"Apple patches Predator-exploited vulnerabilities for iOS, iPadOS, macOS, watchOS"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-98928\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/09\/Predator-Spyware-on-iPhone-iOS-Intellexa-RFernandezPhone-NRaymondPeg-600x300-1.jpg\" alt=\"\" width=\"600\" height=\"300\" \/><\/p>\n<p>On Thursday, September 21, Apple released security updates to address several major flaws. The patched zero-day vulnerabilities are evidently ones that Cytrox&#8217;s Predator spyware has actively exploited in the wild.<\/p>\n<p>Predator is commercial &#8220;mercenary&#8221; spyware, similar to the NSO Group&#8217;s Pegasus spyware. There are conflicting reports about whether Cytrox or Intellexa is properly identified as the company behind Predator. Cytrox is reportedly part of the Intellexa Alliance; Intellexa is a consortium of companies competing against the more well-known NSO Group. All of these organizations are on the U.S. government&#8217;s Entity List of restricted companies.<\/p>\n<p><em>In this article:<\/em><\/p>\n<ul>\n<li><a href=\"#whichos\">Which operating systems did Apple patch (and not patch)?<\/a>\n<ul>\n<li><a href=\"#15\">No patches for iOS 15 or iPadOS 15<\/a><\/li>\n<li><a href=\"#8\">No patches for watchOS 8<\/a><\/li>\n<li><a href=\"#incom\">Possibly incomplete patches for macOS<\/a><\/li>\n<li><a href=\"#undisc\">As-yet undisclosed patches for macOS Ventura 13.6, iOS 16.7 and iPadOS 16.7<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"#whatvuln\">What vulnerabilities did Apple patch?<\/a>\n<ul>\n<li><a href=\"#41991\">Security (CVE-2023-41991)<\/a><\/li>\n<li><a href=\"#41992\">Kernel (CVE-2023-41992)<\/a><\/li>\n<li><a href=\"#41993\">WebKit (CVE-2023-41993)<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"#howinstall\">How to install Apple security updates<\/a><\/li>\n<li><a href=\"#learnmore\">How can I learn more?<\/a><a name=\"whichos\"><\/a><\/li>\n<\/ul>\n<h3>Which operating systems did Apple patch (and not patch)?<\/h3>\n<p>Apple patched at least three new vulnerabilities, as applicable, via the following operating system and Safari updates:<\/p>\n<ul>\n<li><a href=\"https:\/\/support.apple.com\/kb\/HT213926\" target=\"_blank\" rel=\"noopener\">iOS 17.0.1 and iPadOS 17.0.1<\/a><\/li>\n<li><a href=\"https:\/\/support.apple.com\/kb\/HT213927\" target=\"_blank\" rel=\"noopener\">iOS 16.7 and iPadOS 16.7<\/a><\/li>\n<li><a href=\"https:\/\/support.apple.com\/kb\/HT213931\" target=\"_blank\" rel=\"noopener\">macOS Ventura 13.6<\/a><\/li>\n<li><a href=\"https:\/\/support.apple.com\/kb\/HT213932\" target=\"_blank\" rel=\"noopener\">macOS Monterey 12.7<\/a><\/li>\n<li><a href=\"https:\/\/support.apple.com\/kb\/HT213930\" target=\"_blank\" rel=\"noopener\">Safari 16.6.1 for macOS Big Sur and Monterey<\/a><\/li>\n<li><a href=\"https:\/\/support.apple.com\/kb\/HT213928\" target=\"_blank\" rel=\"noopener\">watchOS 10.0.1<\/a><\/li>\n<li><a href=\"https:\/\/support.apple.com\/kb\/HT213929\" target=\"_blank\" rel=\"noopener\">watchOS 9.6.3<\/a><\/li>\n<\/ul>\n<p>The links above go to Apple&#8217;s security release notes for each update.<br \/>\n<a name=\"15\"><\/a><br \/>\nNotably missing from that list are iOS 15 and iPadOS 15, and watchOS 8.<\/p>\n<h4><strong>No patches for iOS 15 or iPadOS 15<\/strong><\/h4>\n<p>Some have speculated that iOS and iPadOS 15 may continue to get security updates over the coming year. Apple has in the past sometimes provided patches for up to three iOS versions as a time; iOS 12 has only had one update per year in 2022 and 2023, patching only one vulnerability in each update. The lack of iOS 15 updates on Thursday may not be a strong indicator either way; it&#8217;s possible that Apple could release more patches sometime later. But at this point, anyone still using an iPhone 6s, 6s Plus, SE (1st generation), 7, or 7 Plus (or an equivalent era iPad) should strongly consider upgrading <a name=\"8\"><\/a>to a model that&#8217;s compatible with iOS 17 (or iPadOS 17) to protect their security and privacy.<\/p>\n<h4><strong>No patches for watchOS 8<\/strong><\/h4>\n<p>Meanwhile, Apple continues to neglect to patch watchOS 8, the last major watchOS version compatible with Apple Watch Series 3. <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-stops-selling-watch-series-3-eight-months-after-its-last-security-update\/\">Apple continued to sell its Series 3 watch until earlier this year<\/a>, specifically March 2023. Since then, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-gives-watch-series-3-users-false-sense-of-security-patching-1-vulnerability\/\">Apple has only released a single patch for a single vulnerability<\/a>\u2014leaving Apple Watch Series 3 highly susceptible to exploitation, including via vulnerabilities that have been actively exploited in the wild. Apple&#8217;s controversial decision to &#8220;quiet quit&#8221; patching a hardware product that it sold <a name=\"incom\"><\/a>mere months ago has, unfortunately, gotten little attention from the press and consumer advocacy groups.<\/p>\n<h4><strong>Possibly incomplete patches for macOS<\/strong><\/h4>\n<p>While macOS Big Sur (the current &#8220;n -2&#8221; release) technically did get one patch for the WebKit vulnerability via the Safari update, this only addresses one of the three potentially applicable vulnerabilities that may affect that operating system.<\/p>\n<p>Meanwhile, macOS Monterey (the current &#8220;n -1&#8221; release) appears to have gotten two of the three patches: the WebKit and kernel vulnerabilities.<\/p>\n<p>But confusingly, macOS Ventura also got only two out of three patches\u2014though different ones from macOS Monterey. The macOS Ventura release notes do not claim that Apple patched the WebKit vulnerability\u2014even though Apple patched it for both of the previous macOS versions. Instead, Apple patched the kernel and &#8220;security&#8221; (signature validation bypass) issues, but perhaps not the WebKit issue.<\/p>\n<p><a name=\"undisc\"><\/a>See below for more details about the vulnerabilities that Apple patched on Thursday and has disclosed so far.<\/p>\n<h4><strong>As-yet undisclosed patches for <\/strong><strong style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\">macOS Ventura 13.6, <\/strong><strong>iOS 16.7 and iPadOS 16.7<\/strong><\/h4>\n<p>The release notes for both macOS Ventura 13.6, and iOS 16.7 and iPadOS 16.7, both state, &#8220;Additional CVE entries coming soon.&#8221; So Apple apparently patched more vulnerabilities than the company has disclosed so far. These iOS and iPadOS 16 updates list all three vulnerabilities enumerated below, which match the iOS and iPadOS 17.0.1 updates from this cycle.<\/p>\n<p>Most likely, the note about &#8220;additional CVE entries&#8221; refers to CVEs patched in the recent release of iOS and iPadOS 17.0 and the pending release of macOS Sonoma 14.0 (coming Tuesday, September 26) that have not yet been publicly disclosed.<a name=\"whatvuln\"><\/a><\/p>\n<h3>What vulnerabilities did Apple patch?<\/h3>\n<p><a name=\"41991\"><\/a>So far, Apple has listed the following vulnerabilities as being included in various of those patches:<\/p>\n<blockquote><p><strong>Security<\/strong><\/p>\n<p>Available for: iPhone 8 and later, iPad Pro (all models), iPad Air 3rd generation and later, iPad 5th generation and later, iPad mini 5th generation and later, macOS Ventura, Apple Watch Series 4 and later<\/p>\n<p>Impact: A malicious app may be able to bypass signature validation. <span style=\"color: #ff0000;\">Apple is aware of a report that this issue may have been actively exploited<\/span> against versions of iOS before iOS 16.7.<\/p>\n<p>Description: A certificate validation issue was addressed.<\/p>\n<p><a name=\"41992\"><\/a>CVE-2023-41991: Bill Marczak of The Citizen Lab at The University of Toronto&#8217;s Munk School and Maddie Stone of Google&#8217;s Threat Analysis Group<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Kernel<\/strong><\/p>\n<p>Available for: iPhone 8 and later, iPad Pro (all models), iPad Air 3rd generation and later, iPad 5th generation and later, iPad mini 5th generation and later, macOS Monterey, macOS Ventura, Apple Watch Series 4 and later<\/p>\n<p>Impact: A local attacker may be able to elevate their privileges. <span style=\"color: #ff0000;\">Apple is aware of a report that this issue may have been actively exploited<\/span> against versions of iOS before iOS 16.7.<\/p>\n<p>Description: The issue was addressed with improved checks.<\/p>\n<p><a name=\"41993\"><\/a>CVE-2023-41992: Bill Marczak of The Citizen Lab at The University of Toronto&#8217;s Munk School and Maddie Stone of Google&#8217;s Threat Analysis Group<\/p>\n<p>&nbsp;<\/p>\n<p><strong>WebKit<\/strong><\/p>\n<p>Available for: iPhone 8 and later, iPad Pro (all models), iPad Air 3rd generation and later, iPad 5th generation and later, iPad mini 5th generation and later, macOS Big Sur and Monterey<\/p>\n<p>Impact: Processing web content may lead to arbitrary code execution. <span style=\"color: #ff0000;\">Apple is aware of a report that this issue may have been actively exploited<\/span> against versions of iOS before iOS 16.7.<\/p>\n<p>Description: The issue was addressed with improved checks.<\/p>\n<p><span class=\"note\">WebKit Bugzilla: 261544<\/span><br \/>\nCVE-2023-41993: Bill Marczak of The Citizen Lab at The University of Toronto&#8217;s Munk School and Maddie Stone of Google&#8217;s Threat Analysis Group<\/p><\/blockquote>\n<p>All three of these vulnerabilities were used as part of an exploit chain to install Predator spyware on iPhones, <a href=\"https:\/\/blog.google\/threat-analysis-group\/0-days-exploited-by-commercial-surveillance-vendor-in-egypt\/\" target=\"_blank\" rel=\"noopener\">according to Google&#8217;s Threat Analysis Group<\/a> (TAG). The Citizen Lab <a href=\"https:\/\/citizenlab.ca\/2023\/09\/predator-in-the-wires-ahmed-eltantawy-targeted-with-predator-spyware-after-announcing-presidential-ambitions\/\" target=\"_blank\" rel=\"noopener\">reports<\/a> that one known target was a presidential candidate in Egypt.<\/p>\n<p>Apple notes that &#8220;Additional CVE entries [are] coming soon&#8221; to the release notes for macOS Ventura 13.6 and for iOS 16.7 and iPadOS 16.7.<a name=\"howinstall\"><\/a><\/p>\n<h3>How to install Apple security updates<\/h3>\n<p>To update a <strong>Mac running macOS Ventura<\/strong>, go to System Settings &gt; General &gt; Software Update.<\/p>\n<p>If you have any trouble getting the macOS update to show up, either press \u2318R at the Software Update screen, or type in the Terminal <code>softwareupdate -l<\/code> (that\u2019s a lowercase L) and press Return\/Enter.<\/p>\n<p>Macs running macOS Big Sur or Monterey can get these updates (or upgrade to macOS Ventura) via System Preferences &gt; Software Update. If your Mac is running macOS High Sierra or older and is compatible with macOS Ventura, look for macOS Ventura in the Mac App Store and download it from there.<\/p>\n<p>Note that only the latest macOS version is ever fully patched; older macOS versions only get a subsection of those patches and remain vulnerable. Therefore, staying on the latest macOS version is critically important for maintaining your security and privacy. For more information, see our article, &#8220;<a href=\"https:\/\/www.intego.com\/mac-security-blog\/when-does-an-old-mac-become-unsafe-to-use\/\">When does an old Mac become unsafe to use?<\/a>&#8221;<\/p>\n<p>Users of <strong>iPhone or iPad<\/strong> can go to Settings &gt; General &gt; Software Update to update iOS or iPadOS on their devices.<\/p>\n<p>To update <strong>watchOS on your Apple Watch<\/strong>, the process is a bit more complicated. First, update your iPhone to the latest operating system it can support (ideally the latest version of iOS 17). Next, ensure that both your iPhone and Watch are on the same Wi-Fi network. Your Apple Watch also needs to have at least a 50% charge. Then open the Watch app on your phone and tap General &gt; Software Update.<\/p>\n<p>Whenever you&#8217;re preparing to update iOS, iPadOS, or macOS, always <strong>back up your data<\/strong> before installing any updates. This gives you a restore point if something does not go as planned. See our related article on <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-verify-your-backups-are-working-properly\/\">how to check your macOS backups to ensure they work correctly<\/a>.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"0Dv8yzyW5z\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-verify-your-backups-are-working-properly\/\">How to Verify Your Backups are Working Properly<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;How to Verify Your Backups are Working Properly&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-verify-your-backups-are-working-properly\/embed\/#?secret=0Dv8yzyW5z\" data-secret=\"0Dv8yzyW5z\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>See also our article on <a href=\"https:\/\/www.intego.com\/mac-security-blog\/should-you-back-up-your-ios-device-to-icloud-or-itunes\/\">how to back up your iPhone or iPad to iCloud and to your Mac<\/a>.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"d4kIDKvlvQ\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/should-you-back-up-your-ios-device-to-icloud-or-itunes\/\">Should you back up your iPhone to iCloud or your Mac? Here&#8217;s how to do both<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Should you back up your iPhone to iCloud or your Mac? Here&#8217;s how to do both&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/should-you-back-up-your-ios-device-to-icloud-or-itunes\/embed\/#?secret=d4kIDKvlvQ\" data-secret=\"d4kIDKvlvQ\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p><a name=\"learnmore\"><\/a><\/p>\n<h3 id=\"exploremore\">How can I learn more?<\/h3>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Twitter-logo-icon-64.png\" alt=\"Follow Intego on Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Facebook-logo-icon-64.png\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/YouTube-logo-icon-64.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Pinterest-logo-icon-64.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/LinkedIn-logo-icon-64.png\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Instagram-logo-icon-64.png\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n<p><span style=\"font-size: x-small;\">Image credits: iPhone: <a href=\"https:\/\/en.wikipedia.org\/wiki\/File:IPhone_15_Pro_Vector.svg\" target=\"_blank\" rel=\"noopener\">Rafael Fernandez<\/a> (<a href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/deed.en\" target=\"_blank\" rel=\"noopener\">CC BY-SA 4.0<\/a>) \u2022 background: <a href=\"https:\/\/www.flickr.com\/photos\/80497449@N04\/8679257947\" target=\"_blank\" rel=\"noopener\">N. Raymond<\/a> (<a href=\"https:\/\/creativecommons.org\/licenses\/by\/2.0\/\" target=\"_blank\" rel=\"noopener\">CC BY 2.0<\/a>) \u2022 <a href=\"https:\/\/www.flickr.com\/photos\/192900114@N05\/52104278212\" target=\"_blank\" rel=\"noopener\">Predator<\/a> \u2022 composition: Joshua Long, Intego (CC BY-SA 4.0).<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>On September 21, Apple patched three zero-day vulnerabilities that had been actively exploited in the wild to infect iPhones with Predator spyware. Macs, iPads, and Apple Watches were also vulnerable and received updates.<\/p>\n","protected":false},"author":14,"featured_media":98927,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[69,4645,4684,4618,4643,201,4583,4688],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"On September 21, Apple patched three zero-day vulnerabilities that had been actively exploited in the wild to infect iPhones with Predator spyware. Macs, iPads, and Apple Watches were also vulnerable and received updates.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-predator-exploited-vulnerabilities-for-ios-ipados-macos-watchos\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple patches Predator-exploited vulnerabilities for iOS, iPadOS, macOS, watchOS - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"On September 21, Apple patched three zero-day vulnerabilities that had been actively exploited in the wild to infect iPhones with Predator spyware. Macs, iPads, and Apple Watches were also vulnerable and received updates.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-predator-exploited-vulnerabilities-for-ios-ipados-macos-watchos\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-23T06:59:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-27T15:00:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/09\/Predator-Spyware-on-iPhone-iOS-Intellexa-RFernandezPhone-NRaymondPeg-400x260-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-predator-exploited-vulnerabilities-for-ios-ipados-macos-watchos\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/09\/Predator-Spyware-on-iPhone-iOS-Intellexa-RFernandezPhone-NRaymondPeg-400x260-1.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/09\/Predator-Spyware-on-iPhone-iOS-Intellexa-RFernandezPhone-NRaymondPeg-400x260-1.jpg\",\"width\":400,\"height\":260,\"caption\":\"Intellexa Predator spyware on iOS; credits: R. Fernandez: iPhone 15 Pro, N. Raymond: Pegasus background\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-predator-exploited-vulnerabilities-for-ios-ipados-macos-watchos\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-predator-exploited-vulnerabilities-for-ios-ipados-macos-watchos\/\",\"name\":\"Apple patches Predator-exploited vulnerabilities for iOS, iPadOS, macOS, watchOS - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-predator-exploited-vulnerabilities-for-ios-ipados-macos-watchos\/#primaryimage\"},\"datePublished\":\"2023-09-23T06:59:25+00:00\",\"dateModified\":\"2023-09-27T15:00:43+00:00\",\"description\":\"On September 21, Apple patched three zero-day vulnerabilities that had been actively exploited in the wild to infect iPhones with Predator spyware. Macs, iPads, and Apple Watches were also vulnerable and received updates.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-predator-exploited-vulnerabilities-for-ios-ipados-macos-watchos\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-predator-exploited-vulnerabilities-for-ios-ipados-macos-watchos\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-predator-exploited-vulnerabilities-for-ios-ipados-macos-watchos\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple patches Predator-exploited vulnerabilities for iOS, iPadOS, macOS, watchOS\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-predator-exploited-vulnerabilities-for-ios-ipados-macos-watchos\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-predator-exploited-vulnerabilities-for-ios-ipados-macos-watchos\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Apple patches Predator-exploited vulnerabilities for iOS, iPadOS, macOS, watchOS\",\"datePublished\":\"2023-09-23T06:59:25+00:00\",\"dateModified\":\"2023-09-27T15:00:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-predator-exploited-vulnerabilities-for-ios-ipados-macos-watchos\/#webpage\"},\"wordCount\":1508,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-predator-exploited-vulnerabilities-for-ios-ipados-macos-watchos\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/09\/Predator-Spyware-on-iPhone-iOS-Intellexa-RFernandezPhone-NRaymondPeg-400x260-1.jpg\",\"keywords\":[\"iOS\",\"iOS 16\",\"iOS 17\",\"macOS Monterey\",\"macOS Ventura\",\"Security Updates\",\"watchOS\",\"watchOS 10\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-predator-exploited-vulnerabilities-for-ios-ipados-macos-watchos\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"On September 21, Apple patched three zero-day vulnerabilities that had been actively exploited in the wild to infect iPhones with Predator spyware. Macs, iPads, and Apple Watches were also vulnerable and received updates.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-predator-exploited-vulnerabilities-for-ios-ipados-macos-watchos\/","og_locale":"en_US","og_type":"article","og_title":"Apple patches Predator-exploited vulnerabilities for iOS, iPadOS, macOS, watchOS - The Mac Security Blog","og_description":"On September 21, Apple patched three zero-day vulnerabilities that had been actively exploited in the wild to infect iPhones with Predator spyware. Macs, iPads, and Apple Watches were also vulnerable and received updates.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-predator-exploited-vulnerabilities-for-ios-ipados-macos-watchos\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2023-09-23T06:59:25+00:00","article_modified_time":"2023-09-27T15:00:43+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/09\/Predator-Spyware-on-iPhone-iOS-Intellexa-RFernandezPhone-NRaymondPeg-400x260-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-predator-exploited-vulnerabilities-for-ios-ipados-macos-watchos\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/09\/Predator-Spyware-on-iPhone-iOS-Intellexa-RFernandezPhone-NRaymondPeg-400x260-1.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/09\/Predator-Spyware-on-iPhone-iOS-Intellexa-RFernandezPhone-NRaymondPeg-400x260-1.jpg","width":400,"height":260,"caption":"Intellexa Predator spyware on iOS; credits: R. Fernandez: iPhone 15 Pro, N. Raymond: Pegasus background"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-predator-exploited-vulnerabilities-for-ios-ipados-macos-watchos\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-predator-exploited-vulnerabilities-for-ios-ipados-macos-watchos\/","name":"Apple patches Predator-exploited vulnerabilities for iOS, iPadOS, macOS, watchOS - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-predator-exploited-vulnerabilities-for-ios-ipados-macos-watchos\/#primaryimage"},"datePublished":"2023-09-23T06:59:25+00:00","dateModified":"2023-09-27T15:00:43+00:00","description":"On September 21, Apple patched three zero-day vulnerabilities that had been actively exploited in the wild to infect iPhones with Predator spyware. Macs, iPads, and Apple Watches were also vulnerable and received updates.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-predator-exploited-vulnerabilities-for-ios-ipados-macos-watchos\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-patches-predator-exploited-vulnerabilities-for-ios-ipados-macos-watchos\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-predator-exploited-vulnerabilities-for-ios-ipados-macos-watchos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Apple patches Predator-exploited vulnerabilities for iOS, iPadOS, macOS, watchOS"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-predator-exploited-vulnerabilities-for-ios-ipados-macos-watchos\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-predator-exploited-vulnerabilities-for-ios-ipados-macos-watchos\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Apple patches Predator-exploited vulnerabilities for iOS, iPadOS, macOS, watchOS","datePublished":"2023-09-23T06:59:25+00:00","dateModified":"2023-09-27T15:00:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-predator-exploited-vulnerabilities-for-ios-ipados-macos-watchos\/#webpage"},"wordCount":1508,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-predator-exploited-vulnerabilities-for-ios-ipados-macos-watchos\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/09\/Predator-Spyware-on-iPhone-iOS-Intellexa-RFernandezPhone-NRaymondPeg-400x260-1.jpg","keywords":["iOS","iOS 16","iOS 17","macOS Monterey","macOS Ventura","Security Updates","watchOS","watchOS 10"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-patches-predator-exploited-vulnerabilities-for-ios-ipados-macos-watchos\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/09\/Predator-Spyware-on-iPhone-iOS-Intellexa-RFernandezPhone-NRaymondPeg-400x260-1.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-pJw","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/98922"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=98922"}],"version-history":[{"count":18,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/98922\/revisions"}],"predecessor-version":[{"id":98981,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/98922\/revisions\/98981"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/98927"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=98922"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=98922"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=98922"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}