	{"id":99248,"date":"2024-01-22T00:01:52","date_gmt":"2024-01-22T08:01:52","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=99248"},"modified":"2024-03-08T13:02:37","modified_gmt":"2024-03-08T21:02:37","slug":"apple-neglects-to-patch-multiple-critical-vulnerabilities-in-macos","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-multiple-critical-vulnerabilities-in-macos\/","title":{"rendered":"Apple neglects to patch multiple critical vulnerabilities in macOS"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"alignnone wp-image-99266 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/11\/Apple-software-update-red-critical-urgent-this-is-fine-bg-600x300-1.jpg\" alt=\"\" width=\"600\" height=\"300\" \/><\/p>\n<p>On October 25, 2023, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-sonoma-14-1-ios-17-1-and-more-with-security-updates\/\">Apple released macOS Sonoma 14.1, which included security updates<\/a>.<\/p>\n<p>About two weeks later, on November 7, Apple released macOS Sonoma 14.1.1, a minor update with no listed security patches.<\/p>\n<p>Oddly, <strong>both of these updates were apparently missing a patch for a critical vulnerability<\/strong> that made headlines one month ago. A popular command-line utility, curl, and its associated library, libcurl, had two newly discovered vulnerabilities. One of them (CVE-2023-38545) had a CVSS &#8220;9.8 CRITICAL&#8221; score out of a maximum 10. The curl project maintainers patched both vulnerabilities on October 11.<\/p>\n<p><strong>Upon further investigation, we found that macOS Sonoma appears to contain several other vulnerabilities.<\/strong> In this article, we&#8217;ll take a look at several known vulnerabilities that apparently remain unpatched in the latest version, macOS Sonoma 14.4.<\/p>\n<p><strong><em>Update: Apple still has not addressed the critical LibreSSL vulnerabilities as of macOS Sonoma 14.4.<\/em><\/strong> We originally published this article on November 10, after Apple released macOS Sonoma 14.1.1. On December 14, we updated this article to note that Apple silently included curl 8.4.0 in the macOS Sonoma 14.2 update, and to note that the rest of the vulnerabilities apparently remain unpatched. On January 26, we updated this article again to note that macOS Sonoma 14.3 finally includes a version of nghttp2 that patches the known vulnerability. And on March 8, we noted that macOS Sonoma 14.4 still hasn&#8217;t patched LibreSSL.<\/p>\n<p><em>In this article:<\/em><\/p>\n<ul>\n<li><a href=\"#curl\">curl in macOS Sonoma 14.1.1 was vulnerable (patched in 14.2)<\/a><\/li>\n<li><a href=\"#libs\">More outdated and vulnerable libraries in macOS Sonoma 14.4<\/a>\n<ul>\n<li><a href=\"#libressl\">LibreSSL remains outdated and vulnerable<\/a><\/li>\n<li><a href=\"#zlib\">zlib remains outdated and may be vulnerable<\/a><\/li>\n<li><a href=\"#nghttp2\">nghttp2 remains outdated and vulnerable (patched in 14.3)<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"#oss\">Why is Apple negligent in patching open-source software?<\/a><\/li>\n<li><a href=\"#users\">What can users do about this?<\/a><\/li>\n<li><a href=\"#learnmore\">How can I learn more?<\/a><a name=\"curl\"><\/a><\/li>\n<\/ul>\n<h3>curl in macOS Sonoma 14.1.1 was vulnerable (patched in 14.2)<\/h3>\n<p>I verified by running the <code>curl --version<\/code> command that, indeed, macOS Sonoma 14.1.1 still appears to have a vulnerable version of curl:<\/p>\n<pre>% curl --version \r\ncurl 8.1.2 (x86_64-apple-darwin23.0) libcurl\/8.1.2 (SecureTransport) LibreSSL\/3.3.6 zlib\/1.2.12 nghttp2\/1.55.1\r\nRelease-Date: 2023-05-30<\/pre>\n<p>The current version of curl is <a href=\"https:\/\/curl.se\/changes.html\" target=\"_blank\" rel=\"noopener\">8.4.0<\/a>, but the version included with macOS Sonoma 14.1.1 is 8.1.2. That curl version is from May 30, 2023 (as noted in the &#8220;Release-Date:&#8221; portion of the command output above). In the six months since then, curl updates have included patches for a total of three vulnerabilities with CVEs:<\/p>\n<ul>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-38039\" target=\"_blank\" rel=\"noopener\">CVE-2023-38039<\/a>: (CVSS 3.1: 7.5 HIGH) HTTP headers eat all memory<\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-38545\" target=\"_blank\" rel=\"noopener\">CVE-2023-38545<\/a>: (CVSS 3.1: <strong>9.8 CRITICAL<\/strong>) SOCKS5 heap buffer overflow<\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-38546\" target=\"_blank\" rel=\"noopener\">CVE-2023-38546<\/a>: (CVSS 3.1: 3.7 LOW) cookie injection with none file<\/li>\n<\/ul>\n<p>Apple makes no mention of these vulnerabilities on its site. There is also no mention of curl in <a href=\"https:\/\/support.apple.com\/en-us\/HT213984\" target=\"_blank\" rel=\"noopener\">macOS Sonoma 14.1&#8217;s security release notes<\/a>; meanwhile, Apple did not even issue security release notes for macOS Sonoma 14.1.1, instead <a href=\"https:\/\/support.apple.com\/en-us\/HT201222\" target=\"_blank\" rel=\"noopener\">stating<\/a> that &#8220;This update has no published CVE entries.&#8221;<\/p>\n<p><strong>Update: Apple silently addressed the curl vulnerabilities in macOS Sonoma 14.2.<\/strong> Specifically, Apple now includes curl 8.4.0 with the OS as of the December 11 update. (For some reason, Apple didn&#8217;t upgrade to curl 8.5.0, released on December 6. Version 8.5.0 does not address any CVEs, but includes several SSL-related patches.) Apple did not mention its move to curl 8.4.0 anywhere on its site. Likewise, Apple did not mention the CVEs in the update&#8217;s security release notes.<\/p>\n<p><strong><em>But that&#8217;s not the end of the story.<\/em><\/strong><a name=\"libs\"><\/a><\/p>\n<h3>More outdated and vulnerable libraries in macOS Sonoma 14.4<\/h3>\n<p>If we take a closer look at the command output above, we can see curl&#8217;s dependencies. Aside from curl&#8217;s own libcurl, the app relies upon other open-source software: LibreSSL, zlib, and nghttp2.<\/p>\n<p><a name=\"libressl\"><\/a>None of those libraries is up to date. In fact, <strong>nearly all of them may be vulnerable<\/strong>, as I&#8217;ll detail below.<\/p>\n<h4><strong>LibreSSL remains outdated and vulnerable<\/strong><\/h4>\n<p>The current version of LibreSSL is <a href=\"https:\/\/www.libressl.org\/releases.html\" target=\"_blank\" rel=\"noopener\">3.8.2<\/a>, released November 2, 2023. The version included with macOS Sonoma is 3.3.6, released March 15, 2022\u2014about <strong>two years ago<\/strong>.<\/p>\n<pre>% openssl version \r\nLibreSSL 3.3.6<\/pre>\n<p>According to NIST&#8217;s National Vulnerability Database, <a href=\"https:\/\/nvd.nist.gov\/vuln\/search\/results?form_type=Advanced&amp;results_type=overview&amp;isCpeNameSearch=true&amp;seach_type=all&amp;query=cpe:2.3:a:openbsd:libressl:3.3.6:*:*:*:*:*:*:*\" target=\"_blank\" rel=\"noopener\">this version of LibreSSL contains at least four known vulnerabilities<\/a>:<\/p>\n<ul>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-41581\" target=\"_blank\" rel=\"noopener\">CVE-2021-41581<\/a>: (CVSS 3.1: 5.5 MEDIUM) stack-based buffer over-read<\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-48437\" target=\"_blank\" rel=\"noopener\">CVE-2022-48437<\/a>: (CVSS 3.1: 5.3 MEDIUM) continue upon detecting invalid certificate<\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-46880\" target=\"_blank\" rel=\"noopener\">CVE-2021-46880<\/a>: (CVSS 3.1: <strong>9.8 CRITICAL<\/strong>) authentication bypass<\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-35784\" target=\"_blank\" rel=\"noopener\">CVE-2023-35784<\/a>: (CVSS 3.1: <strong>9.8 CRITICAL<\/strong>) double free or use after free could occur<\/li>\n<\/ul>\n<p><a name=\"zlib\"><\/a>Apple makes no mention of these vulnerabilities on its site.<\/p>\n<h4><strong>zlib remains outdated and may be vulnerable<\/strong><\/h4>\n<p>The current version of zlib is <a href=\"https:\/\/zlib.net\/ChangeLog.txt\" target=\"_blank\" rel=\"noopener\">1.3<\/a>, released August 18. The zlib version included with macOS Sonoma is 1.2.12, released March 27, 2022\u2014again, about two years ago:<\/p>\n<pre>% python3 -c \"import zlib; print(zlib.ZLIB_RUNTIME_VERSION)\" \r\n1.2.12<\/pre>\n<p>Since then, a zlib update included a patch for a critical &#8220;9.8 out of 10&#8221; severity vulnerability:<\/p>\n<ul>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-37434\" target=\"_blank\" rel=\"noopener\">CVE-2022-37434<\/a>: (CVSS 3.1: <strong>9.8 CRITICAL<\/strong>) bug when getting gzip header extra field<\/li>\n<\/ul>\n<p>Interestingly, Apple <a href=\"https:\/\/support.apple.com\/en-us\/HT213488\" target=\"_blank\" rel=\"noopener\">says<\/a> that it addressed this vulnerability &#8220;with improved checks&#8221; in the first release of macOS Ventura 13, a little over a year ago. <a name=\"nghttp2\"><\/a>If true, it&#8217;s strange that Apple would apparently leave the old version in place; newer versions contain other bug fixes, too, not just the security fix.<\/p>\n<h4><strong>nghttp2 was outdated and vulnerable (patched in 14.3)<\/strong><\/h4>\n<p>The current version of nghttp2 is <a href=\"https:\/\/github.com\/nghttp2\/nghttp2\/releases\" target=\"_blank\" rel=\"noopener\">1.59.0<\/a>, released January 21, 2024. The version included with curl in macOS Sonoma 14.2 is 1.55.1, released July 14, 2023. Since then, an nghttp2 update patched a &#8220;7.5 out of 10&#8221; high-severity vulnerability that has been <strong>actively exploited in the wild<\/strong>:<\/p>\n<ul>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-44487\" target=\"_blank\" rel=\"noopener\">CVE-2023-44487<\/a>: (CVSS 3.1: 7.5 HIGH) request cancellation can reset many streams quickly<\/li>\n<\/ul>\n<p>Apple makes no mention of this vulnerability on its site.<\/p>\n<p><strong>Update: Apple silently addressed the nghttp2 vulnerability in macOS Sonoma 14.3<\/strong> on January 22, 2024, by upgrading to 1.58.0. Although it&#8217;s not actually the latest version, it does at least fix the known vulnerability. Apple did not mention its move to nghttp2 1.58.0 anywhere on its site. Likewise, Apple did not mention the CVE in the update&#8217;s security release notes.<a name=\"oss\"><\/a><\/p>\n<h3>Why is Apple negligent in patching open-source software?<\/h3>\n<p>Notably, this isn&#8217;t the first time that Apple has neglected to patch open-source software quickly in its operating systems.<\/p>\n<p>One well-documented public example of this was <a href=\"https:\/\/www.macrumors.com\/2022\/01\/28\/apple-removing-python-2-in-macos-12-3\/\" target=\"_blank\" rel=\"noopener\">Apple&#8217;s inclusion of Python 2.7 with macOS for nearly two years after its final update<\/a>. But Apple doesn&#8217;t always get media coverage for such occurrences. Rather, outdated open-source software in macOS often goes unnoticed, except amongst the handful of security researchers who pay close attention to such things.<\/p>\n<p>We reached out to Apple for comment. Apple has not responded to our inquiry.<a name=\"users\"><\/a><\/p>\n<h3>What can users do about this?<\/h3>\n<p>Unfortunately, when Apple chooses not to patch known vulnerabilities quickly, it leaves end users exposed.<\/p>\n<p>Although there is little that Mac users can do, there is one important thing. You can help put pressure on Apple by raising awareness of reports like this one.<\/p>\n<p>We encourage responsible media outlets to report on issues of public concern like this, to encourage Apple to not take a lax approach to security issues.<a name=\"learnmore\"><\/a><\/p>\n<h3 id=\"exploremore\">How can I learn more?<\/h3>\n<p>We first discussed the missing curl patch on the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/dragonegg-watering-holes-google-passkeys-and-curl-intego-mac-podcast-episode-313\/\">October 12 episode<\/a> of the Intego Mac Podcast:<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/player.fireside.fm\/v2\/GegHgcrH+31ddcwZ8?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Twitter-logo-icon-64.png\" alt=\"Follow Intego on Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Facebook-logo-icon-64.png\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/YouTube-logo-icon-64.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Pinterest-logo-icon-64.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/LinkedIn-logo-icon-64.png\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Instagram-logo-icon-64.png\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple is neglecting to patch high-severity vulnerabilities in open-source components of macOS Sonoma, including LibreSSL.<\/p>\n","protected":false},"author":14,"featured_media":99268,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[4686,143],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Apple is neglecting to patch high-severity vulnerabilities in open-source components of macOS Sonoma, including LibreSSL.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-multiple-critical-vulnerabilities-in-macos\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple neglects to patch multiple critical vulnerabilities in macOS - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Apple is neglecting to patch high-severity vulnerabilities in open-source components of macOS Sonoma, including LibreSSL.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-multiple-critical-vulnerabilities-in-macos\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-22T08:01:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-08T21:02:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/11\/Apple-software-update-red-critical-urgent-this-is-fine-bg-400x260-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-multiple-critical-vulnerabilities-in-macos\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/11\/Apple-software-update-red-critical-urgent-this-is-fine-bg-400x260-1.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/11\/Apple-software-update-red-critical-urgent-this-is-fine-bg-400x260-1.jpg\",\"width\":400,\"height\":260,\"caption\":\"Apple software update red critical urgent actively exploited zero-day vulnerability with subtle this is fine meme dog fire background\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-multiple-critical-vulnerabilities-in-macos\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-multiple-critical-vulnerabilities-in-macos\/\",\"name\":\"Apple neglects to patch multiple critical vulnerabilities in macOS - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-multiple-critical-vulnerabilities-in-macos\/#primaryimage\"},\"datePublished\":\"2024-01-22T08:01:52+00:00\",\"dateModified\":\"2024-03-08T21:02:37+00:00\",\"description\":\"Apple is neglecting to patch high-severity vulnerabilities in open-source components of macOS Sonoma, including LibreSSL.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-multiple-critical-vulnerabilities-in-macos\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-multiple-critical-vulnerabilities-in-macos\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-multiple-critical-vulnerabilities-in-macos\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple neglects to patch multiple critical vulnerabilities in macOS\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-multiple-critical-vulnerabilities-in-macos\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-multiple-critical-vulnerabilities-in-macos\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Apple neglects to patch multiple critical vulnerabilities in macOS\",\"datePublished\":\"2024-01-22T08:01:52+00:00\",\"dateModified\":\"2024-03-08T21:02:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-multiple-critical-vulnerabilities-in-macos\/#webpage\"},\"wordCount\":1157,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-multiple-critical-vulnerabilities-in-macos\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/11\/Apple-software-update-red-critical-urgent-this-is-fine-bg-400x260-1.jpg\",\"keywords\":[\"macOS Sonoma\",\"Vulnerabilities\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-multiple-critical-vulnerabilities-in-macos\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Apple is neglecting to patch high-severity vulnerabilities in open-source components of macOS Sonoma, including LibreSSL.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-multiple-critical-vulnerabilities-in-macos\/","og_locale":"en_US","og_type":"article","og_title":"Apple neglects to patch multiple critical vulnerabilities in macOS - The Mac Security Blog","og_description":"Apple is neglecting to patch high-severity vulnerabilities in open-source components of macOS Sonoma, including LibreSSL.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-multiple-critical-vulnerabilities-in-macos\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2024-01-22T08:01:52+00:00","article_modified_time":"2024-03-08T21:02:37+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/11\/Apple-software-update-red-critical-urgent-this-is-fine-bg-400x260-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-multiple-critical-vulnerabilities-in-macos\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/11\/Apple-software-update-red-critical-urgent-this-is-fine-bg-400x260-1.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/11\/Apple-software-update-red-critical-urgent-this-is-fine-bg-400x260-1.jpg","width":400,"height":260,"caption":"Apple software update red critical urgent actively exploited zero-day vulnerability with subtle this is fine meme dog fire background"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-multiple-critical-vulnerabilities-in-macos\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-multiple-critical-vulnerabilities-in-macos\/","name":"Apple neglects to patch multiple critical vulnerabilities in macOS - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-multiple-critical-vulnerabilities-in-macos\/#primaryimage"},"datePublished":"2024-01-22T08:01:52+00:00","dateModified":"2024-03-08T21:02:37+00:00","description":"Apple is neglecting to patch high-severity vulnerabilities in open-source components of macOS Sonoma, including LibreSSL.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-multiple-critical-vulnerabilities-in-macos\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-multiple-critical-vulnerabilities-in-macos\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-multiple-critical-vulnerabilities-in-macos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Apple neglects to patch multiple critical vulnerabilities in macOS"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-multiple-critical-vulnerabilities-in-macos\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-multiple-critical-vulnerabilities-in-macos\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Apple neglects to patch multiple critical vulnerabilities in macOS","datePublished":"2024-01-22T08:01:52+00:00","dateModified":"2024-03-08T21:02:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-multiple-critical-vulnerabilities-in-macos\/#webpage"},"wordCount":1157,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-multiple-critical-vulnerabilities-in-macos\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/11\/Apple-software-update-red-critical-urgent-this-is-fine-bg-400x260-1.jpg","keywords":["macOS Sonoma","Vulnerabilities"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-multiple-critical-vulnerabilities-in-macos\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/11\/Apple-software-update-red-critical-urgent-this-is-fine-bg-400x260-1.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-pOM","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/99248"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=99248"}],"version-history":[{"count":22,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/99248\/revisions"}],"predecessor-version":[{"id":99267,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/99248\/revisions\/99267"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/99268"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=99248"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=99248"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=99248"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}