{"id":99627,"date":"2024-01-24T23:44:58","date_gmt":"2024-01-25T07:44:58","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=99627"},"modified":"2024-01-25T21:09:46","modified_gmt":"2024-01-26T05:09:46","slug":"apple-patches-1st-in-the-wild-exploited-bug-of-2024-in-macos-sonoma-14-3-ios-17-3-and-more","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-1st-in-the-wild-exploited-bug-of-2024-in-macos-sonoma-14-3-ios-17-3-and-more\/","title":{"rendered":"Apple patches 1st in-the-wild exploited bug of 2024 in macOS Sonoma 14.3, iOS 17.3 and more"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"alignnone size-full wp-image-97208\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-600x300-1.png\" alt=\"\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-600x300-1.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-600x300-1-300x150.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-600x300-1-150x75.png 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>On Monday, January 22, Apple released operating system updates that introduced new features and fixed security vulnerabilities. According to Apple, one of those vulnerabilities &#8220;may have been exploited&#8221; in the wild. Let&#8217;s take a look at some of the highlights of this week&#8217;s updates.<\/p>\n<p><em>In this article:<\/em><\/p>\n<ul>\n<li>macOS Sonoma 14.3<\/li>\n<li>macOS Ventura 13.6.4<\/li>\n<li>macOS Monterey 12.7.3<\/li>\n<li>Safari 17.3 for macOS Ventura and Monterey<\/li>\n<li>iOS 17.3 and iPadOS 17.3<\/li>\n<li>iOS 16.7.5 and iPadOS 16.7.5<\/li>\n<li>iOS 15.8.1 and iPadOS 15.8.1<\/li>\n<li>watchOS 10.3<\/li>\n<li>tvOS 17.3<\/li>\n<li>How to install Apple security updates<\/li>\n<li>How can I learn more?<\/li>\n<\/ul>\n<h3>macOS Sonoma 14.3<\/h3>\n<p><strong>Available for:<\/strong><br \/>\nAll supported Macs capable of running macOS Sonoma<\/p>\n<p><strong>Update information:<\/strong><\/p>\n<ul>\n<li>macOS Sonoma 14.3 introduces enhancements to Apple Music, as well as other features, bug fixes, and security updates for your Mac.\n<ul>\n<li>Collaborate on playlists in Apple Music allows you to invite friends to join your playlist and everyone can add, reorder, and remove songs<\/li>\n<li>Emoji reactions can be added to any track in a collaborative playlist in Apple Music<\/li>\n<li>AppleCare &amp; Warranty in Settings shows your coverage for all devices signed in with your Apple ID<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>Enterprise:<\/strong><\/p>\n<ul>\n<li>Xsan volumes no longer fail to mount automatically.<\/li>\n<li>Passwords can be changed successfully at the login window.<\/li>\n<li>Improves reliability authenticating to an SMB print server.<\/li>\n<li>Improves reliability using single sign-on when using a proxy for associated domains traffic.<\/li>\n<\/ul>\n<p><strong>Security-related fixes and updates:<\/strong><br \/>\nAt least 17 vulnerabilities were addressed in this update. Here are a few interesting ones:<\/p>\n<blockquote><p><strong>Finder<br \/>\n<\/strong>Impact: An app may be able to access sensitive user data<br \/>\nDescription: The issue was addressed with improved checks.<\/p>\n<p><strong>Mail Search<br \/>\n<\/strong>Impact: An app may be able to access sensitive user data<br \/>\nDescription: This issue was addressed with improved redaction of sensitive information.<\/p>\n<p><strong>Safari<br \/>\n<\/strong>Impact: A user&#8217;s private browsing activity may be visible in Settings<br \/>\nDescription: A privacy issue was addressed with improved handling of user preferences.<\/p>\n<p><strong>Shortcuts<br \/>\n<\/strong>Impact: A shortcut may be able to use sensitive data with certain actions without prompting the user<br \/>\nand, An app may be able to bypass certain Privacy preferences<br \/>\nDescription: The issue was addressed with additional permissions checks<br \/>\nand, A privacy issue was addressed with improved handling of temporary files.<\/p>\n<p><strong>Time Zone<br \/>\n<\/strong>Impact: An app may be able to view a user&#8217;s phone number in system logs<br \/>\nDescription: This issue was addressed with improved redaction of sensitive information.<\/p><\/blockquote>\n<p>WebKit often receives security-related fixes with each update, and this time is no exception. However, one of the WebKit patches included in this update is quite serious:<\/p>\n<blockquote><p><strong>WebKit<br \/>\n<\/strong>Impact: Processing maliciously crafted web content may lead to arbitrary code execution. <strong><span style=\"color: #ff0000;\">Apple is aware of a report that this issue may have been exploited<\/span><\/strong>.<br \/>\nDescription: A type confusion issue was addressed with improved checks.<\/p><\/blockquote>\n<p>For the full list of security patches included in macOS Sonoma 14.3, <a href=\"https:\/\/support.apple.com\/en-us\/HT214061\" target=\"_blank\" rel=\"noopener\">have a look here<\/a>.<\/p>\n<p>Meanwhile, <strong>the open-source component LibreSSL appears to still contain critical unpatched vulnerabilities.<\/strong> See <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-multiple-critical-vulnerabilities-in-macos\/\">our detailed report about these known vulnerabilities that affect every Mac today<\/a>.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"DaL8Au9Skl\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-multiple-critical-vulnerabilities-in-macos\/\">Apple neglects to patch multiple critical vulnerabilities in macOS<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Apple neglects to patch multiple critical vulnerabilities in macOS&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/apple-neglects-to-patch-multiple-critical-vulnerabilities-in-macos\/embed\/#?secret=DaL8Au9Skl\" data-secret=\"DaL8Au9Skl\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>You can get this update by going to <strong>System Settings<\/strong> &gt; <strong>Software Update<\/strong>, where compatible Macs running macOS Mojave or newer will see the Sonoma update appear. If your Mac is running macOS High Sierra or older, look for macOS Sonoma in the App Store and download it from there.<\/p>\n<p><a name=\"libressl\"><\/a>Notably, users of OpenCore Legacy Patcher (i.e. people who <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-keep-older-macs-secure-a-geeky-approach\/\">run macOS Sonoma on an unsupported Mac<\/a>) must <a href=\"https:\/\/github.com\/dortania\/OpenCore-Legacy-Patcher\/releases\" target=\"_blank\" rel=\"noopener\">update to the latest version<\/a> before attempting to update to the latest version of macOS Sonoma.<\/p>\n<h3>macOS Ventura 13.6.4<\/h3>\n<p><strong>Available for:<\/strong><br \/>\nAll supported Macs currently running macOS Ventura<\/p>\n<p><strong>Security-related fixes and updates:<\/strong><br \/>\nAt least 13 vulnerabilities were addressed. Most of them the same as those addressed in the macOS Sonoma update, including the fix for the exploited WebKit vulnerability. Enterprise users also received the following improvement:<\/p>\n<blockquote><p>Xsan volumes no longer fail to mount automatically.<\/p><\/blockquote>\n<p>A few of the fixes in this update, that are not found in the macOS Sonoma update (because they were previously patched in earlier Sonoma updates) are:<\/p>\n<blockquote><p><strong>Core Data<br \/>\n<\/strong>Impact: An app may be able to bypass Privacy preferences<br \/>\nDescription: This issue was addressed by removing the vulnerable code.<\/p>\n<p><strong>curl<br \/>\n<\/strong>Impact: Multiple issues in curl<br \/>\nDescription: Multiple issues were addressed by updating to curl version 8.4.0<\/p>\n<p><strong>LoginWindow<br \/>\n<\/strong>Impact: A local attacker may be able to view the previous logged in user\u2019s desktop from the fast user switching screen<br \/>\nDescription: An authentication issue was addressed with improved state management.<\/p><\/blockquote>\n<p>For the full list of security patches included in macOS Ventura 13.6.4, <a href=\"https:\/\/support.apple.com\/en-us\/HT214058\" target=\"_blank\" rel=\"noopener\">have a look here<\/a>.<\/p>\n<p>You can get this update by going to <strong>System Settings<\/strong> &gt; <strong>Software Update<\/strong>.<\/p>\n<h3>macOS Monterey 12.7.3<\/h3>\n<p><strong>Available for:<\/strong><br \/>\nAll supported Macs currently running macOS Monterey<\/p>\n<p><strong>Security-related fixes and updates:<\/strong><br \/>\nAt least nine vulnerabilities were addressed in this update, overlapping with some of those addressed in the macOS Sonoma and Ventura updates.<\/p>\n<p>For the full list of security patches included in macOS Monterey 12.7.3, <a href=\"https:\/\/support.apple.com\/en-us\/HT214057\" target=\"_blank\" rel=\"noopener\">have a look here<\/a>.<\/p>\n<p>You can get this update by going to <strong>System Preferences<\/strong> &gt; <strong>Software Update<\/strong>.<\/p>\n<h3>Safari 17.3 for macOS Ventura and Monterey<\/h3>\n<p>This update addresses four WebKit issues, the same as those addressed in the macOS Sonoma 14.3 update.<\/p>\n<p>The short list of fixes <a href=\"https:\/\/support.apple.com\/en-us\/HT214056\" target=\"_blank\" rel=\"noopener\">can be seen here<\/a>, and the update is available in <strong>System Preferences<\/strong> &gt;<strong> Software Update<\/strong> on your Mac. It will pop up as an available update once macOS 13.6.4 or 12.7.3 has been installed.<\/p>\n<h3>iOS 17.3 and iPadOS 17.3<\/h3>\n<p><strong>Available for:<\/strong><br \/>\niPhone XS and later, iPad Pro 12.9-inch 2nd generation and later, iPad Pro 10.5-inch, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 6th generation and later, and iPad mini 5th generation and later<\/p>\n<p><strong>Update information:<\/strong><\/p>\n<p>This update introduces additional security measures with Stolen Device Protection. This release also includes a new Unity wallpaper to honor Black history and culture in celebration of Black History Month, as well as other features, bug fixes, and security updates for your iPhone.<\/p>\n<p><strong>About Stolen Device Protection:<\/strong><\/p>\n<ul>\n<li>Stolen Device Protection increases security of iPhone and Apple ID by requiring Face ID or Touch ID with no passcode fallback to perform certain actions<\/li>\n<li>Security Delay requires Face ID or Touch ID, an hour wait, and then an additional successful biometric authentication before sensitive operations like changing device passcode or Apple ID password can be performed<\/li>\n<\/ul>\n<p>More information about this feature can be found <a href=\"https:\/\/support.apple.com\/en-us\/HT212510\" target=\"_blank\" rel=\"noopener\">here<\/a> on Apple&#8217;s site. You can also check out our write-up of <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-enable-stolen-device-protection-for-iphone\/\">how to set up Stolen Device Protection on your iPhone<\/a>, and why we recommend it.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"n0RpjcDy8m\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-enable-stolen-device-protection-for-iphone\/\">How to enable Stolen Device Protection for iPhone<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;How to enable Stolen Device Protection for iPhone&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-enable-stolen-device-protection-for-iphone\/embed\/#?secret=n0RpjcDy8m\" data-secret=\"n0RpjcDy8m\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p><strong>Other new features:<\/strong><\/p>\n<ul>\n<li>Lock Screen<br \/>\nNew Unity wallpaper honors Black history and culture in celebration of Black History Month<\/li>\n<li>Music<br \/>\nCollaborate on playlists allows you to invite friends to join your playlist and everyone can add, reorder, and remove songs<br \/>\nEmoji reactions can be added to any track in a collaborative playlist<\/li>\n<\/ul>\n<p><strong>Enterprise:<\/strong><\/p>\n<ul>\n<li>Stolen Device Protection must first be disabled in order to install configuration profiles, manually enroll in Mobile Device Management, or manually configure Exchange accounts.<\/li>\n<\/ul>\n<p><strong>Bug fixes &amp; improvements:<\/strong><\/p>\n<ul>\n<li>AirPlay hotel support lets you stream content directly to the TV in your room in select hotels<\/li>\n<li>AppleCare &amp; Warranty in Settings shows your coverage for all devices signed in with your Apple ID<\/li>\n<li>Crash detection optimizations (all iPhone 14 and iPhone 15 models)<\/li>\n<\/ul>\n<p><strong>Security-related fixes and updates:<\/strong><br \/>\nAt least 16 vulnerabilities were addressed in this update, many of them the same as those addressed in the aforementioned macOS updates.<\/p>\n<p>One fix unique to iOS and iPadOS 17.3 is for an issue with the new Stolen Device Protection:<\/p>\n<blockquote><p><strong>Reset Services<br \/>\n<\/strong>Impact: Stolen Device Protection may be unexpectedly disabled<br \/>\nDescription: The issue was addressed with improved authentication.<\/p><\/blockquote>\n<p>The full list of security issues that were addressed can be found <a href=\"https:\/\/support.apple.com\/en-us\/HT214059\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>. To get your hands on this latest update, connect your device to your Mac and follow the update prompts. You can also download these updates over the air by going to <strong>Settings<\/strong> &gt; <strong>General<\/strong> &gt; <strong>Software Update<\/strong> on your device.<\/p>\n<h3>iOS 16.7.5 and iPadOS 16.7.5<\/h3>\n<p><strong>Available for:<\/strong><br \/>\niPhone 8 and later, iPad Pro (all models), iPad Air 3rd generation and later, iPad 5th generation and later, and iPad mini 5th generation and later<\/p>\n<p><strong>Security-related fixes and updates:<\/strong><br \/>\nAt least eight vulnerabilities were addressed in this update, all of them the same as those covered in the previously mentioned OS updates.<\/p>\n<p>The full list of security issues that were addressed can be found <a href=\"https:\/\/support.apple.com\/en-us\/HT214063\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>. To get this latest update, connect your device to your Mac and follow the update prompts. You can also download these updates over the air by going to <strong>Settings<\/strong> &gt; <strong>General<\/strong> &gt; <strong>Software Update<\/strong> on your device.<\/p>\n<h3>iOS 15.8.1 and iPadOS 15.8.1<\/h3>\n<p><strong>Available for:<\/strong><br \/>\niPhone 6s (all models), iPhone 7 (all models), iPhone SE (1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch (7th generation)<\/p>\n<p><strong>Security-related fixes and updates:<\/strong><\/p>\n<p>Although only two updates are listed for 15.8.1, they are both significant. Both involve WebKit vulnerabilities that may have been exploited in the past.<\/p>\n<blockquote><p><strong>WebKit<br \/>\n<\/strong>Impact: Processing web content may disclose sensitive information. <strong><span style=\"color: #ff0000;\">Apple is aware of a report that this issue may have been exploited against versions of iOS before iOS 16.7.1<\/span><\/strong>.<br \/>\nDescription: An out-of-bounds read was addressed with improved input validation.<\/p>\n<p><strong>WebKit<br \/>\n<\/strong>Impact: Processing web content may lead to arbitrary code execution. <strong><span style=\"color: #ff0000;\">Apple is aware of a report that this issue may have been exploited against versions of iOS before iOS 16.7.1<\/span><\/strong>.<br \/>\nDescription: A memory corruption vulnerability was addressed with improved locking.<\/p><\/blockquote>\n<p>See <a href=\"https:\/\/support.apple.com\/en-us\/HT214062\" target=\"_blank\" rel=\"noopener\">here<\/a> to read Apple&#8217;s brief document about this update.<\/p>\n<p>To get this latest update, connect your device to your Mac and follow the update prompts. You can also download these updates over the air by going to <strong>Settings<\/strong> &gt; <strong>General<\/strong> &gt; <strong>Software Update<\/strong> on your device.<\/p>\n<h3>watchOS 10.3<\/h3>\n<p><strong>Available for:<\/strong><br \/>\nApple Watch Series 4 and later<\/p>\n<p><strong>Update information:<\/strong><\/p>\n<ul>\n<li>watchOS 10.3 includes new features, improvements, and bug fixes, including new Unity Bloom watch face to honor Black history and culture in celebration of Black History Month.<\/li>\n<\/ul>\n<p><strong>Security-related fixes and updates:<br \/>\n<\/strong>At least 12 vulnerabilities were addressed in this update, all of them the same as those covered in the previously mentioned OS updates.<\/p>\n<p>The full list of security issues that were addressed can be found <a href=\"https:\/\/support.apple.com\/en-us\/HT214060\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>. To install this update, make sure your iPhone is up to date first, both your phone and watch are connected to the same Wi-Fi network, and the watch has at least a 50% charge. Then open the Watch app on your phone and tap <strong>General<\/strong> &gt; <strong>Software Update<\/strong>.<\/p>\n<h3>tvOS 17.3<\/h3>\n<div><strong>Available for:<\/strong><br \/>\nApple TV HD and Apple TV 4K (all models)<\/div>\n<div><strong><br \/>\nSecurity-related fixes and updates:<\/strong><\/div>\n<div>At least nine vulnerabilities were addressed in this update, all of them the same as those covered in the previously mentioned OS updates.<\/div>\n<p>The full list of security issues that were addressed can be found <a href=\"https:\/\/support.apple.com\/en-us\/HT214055\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<a name=\"howinstall\"><\/a><\/p>\n<h3>How to install Apple security updates<\/h3>\n<p>Every update that was released today, with the exception of watchOS 10.3, includes a fix for a vulnerability that has reportedly been exploited in the wild. It is therefore ideal to update as soon as you reasonably can.<\/p>\n<h4><strong>How to install macOS updates<\/strong><\/h4>\n<p><strong>If you haven&#8217;t yet upgraded to macOS Sonoma<\/strong>, be sure to first update your critical software. For example, run Intego&#8217;s NetUpdate utility and install all available updates, and then check for updates for all other software that you use regularly. Next, check for macOS updates by going to System Settings &gt; General &gt; Software Update.<\/p>\n<p>If you have any trouble getting the macOS update to show up, either press \u2318R at the Software Update screen, or type in the Terminal <code>softwareupdate -l<\/code> (that\u2019s a lowercase L) and press Return\/Enter, then check System Settings &gt; General &gt; Software Update again.<\/p>\n<p>Macs running macOS Big Sur or Monterey can get these updates (or upgrade to macOS Sonoma) via System Preferences &gt; Software Update. If you have an iMac Pro or a MacBook Pro (2018) that&#8217;s still running macOS High Sierra, <a href=\"https:\/\/apps.apple.com\/us\/app\/macos-sonoma\/id6450717509\" target=\"_blank\" rel=\"noopener\">look for macOS Sonoma in the Mac App Store<\/a> and download it from there.<\/p>\n<p>Note that <strong>only the latest macOS version (currently, that&#8217;s macOS Sonoma) is ever fully patched<\/strong>; older macOS versions only get a subsection of those patches and remain vulnerable. Therefore, staying on the latest macOS version is critically important for maintaining your security and privacy. For more information, see our article, &#8220;<a href=\"https:\/\/www.intego.com\/mac-security-blog\/when-does-an-old-mac-become-unsafe-to-use\/\">When does an old Mac become unsafe to use?<\/a>&#8221;<\/p>\n<h4><strong>How to install other Apple OS updates<\/strong><\/h4>\n<p>Users of <strong>iPhone or iPad<\/strong> can go to Settings &gt; General &gt; Software Update to update iOS or iPadOS on their devices. (This is called an &#8220;over the air&#8221; or OTA update.) Alternatively, you can connect your device to your Mac, click on the device name in a Finder window sidebar, and check for updates there.<\/p>\n<p>To update <strong>watchOS on your Apple Watch<\/strong>, the process is a bit more complicated. First, update your iPhone to the latest operating system it can support (ideally the latest version of iOS 17). Next, ensure that both your iPhone and Apple Watch are on the same Wi-Fi network. Your Apple Watch also needs to have at least a 50% charge. Then open the Watch app on your iPhone and tap General &gt; Software Update.<\/p>\n<p>Whenever you&#8217;re preparing to update macOS, iOS, or iPadOS, it&#8217;s a good idea to always <strong>back up your data<\/strong> before installing any updates. This gives you a restore point if something does not go as planned. See our related article on <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-verify-your-backups-are-working-properly\/\">how to check your macOS backups to ensure they work correctly<\/a>.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"w8AtmAaPhq\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-verify-your-backups-are-working-properly\/\">How to Verify Your Backups are Working Properly<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;How to Verify Your Backups are Working Properly&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-verify-your-backups-are-working-properly\/embed\/#?secret=w8AtmAaPhq\" data-secret=\"w8AtmAaPhq\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>See also our article on <a href=\"https:\/\/www.intego.com\/mac-security-blog\/should-you-back-up-your-ios-device-to-icloud-or-itunes\/\">how to back up your iPhone or iPad to iCloud and to your Mac<\/a>.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"2975uCagVD\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/should-you-back-up-your-ios-device-to-icloud-or-itunes\/\">Should you back up your iPhone to iCloud or your Mac? Here&#8217;s how to do both<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Should you back up your iPhone to iCloud or your Mac? Here&#8217;s how to do both&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/should-you-back-up-your-ios-device-to-icloud-or-itunes\/embed\/#?secret=2975uCagVD\" data-secret=\"2975uCagVD\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p><a name=\"learnmore\"><\/a><\/p>\n<h3 id=\"exploremore\">How can I learn more?<\/h3>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Twitter-logo-icon-64.png\" alt=\"Follow Intego on Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Facebook-logo-icon-64.png\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/YouTube-logo-icon-64.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Pinterest-logo-icon-64.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/LinkedIn-logo-icon-64.png\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Instagram-logo-icon-64.png\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple has released macOS Sonoma 14.3, iOS 17.3, and more, including a patch for the first in-the-wild exploited Apple vulnerability of 2024, as well as Stolen Device Protection for iPhone. Here is everything you need to know about the latest Apple updates.<\/p>\n","protected":false},"author":79,"featured_media":97207,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[24,69,4627,4645,4684,4618,4686,4643,115,201,4583,4688],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Apple has released macOS Sonoma 14.3, iOS 17.3, and more, including a patch for the first in-the-wild exploited Apple vulnerability of 2024, as well as Stolen Device Protection for iPhone. Here is everything you need to know about the latest Apple updates.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-1st-in-the-wild-exploited-bug-of-2024-in-macos-sonoma-14-3-ios-17-3-and-more\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple patches 1st in-the-wild exploited bug of 2024 in macOS Sonoma 14.3, iOS 17.3 and more - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Apple has released macOS Sonoma 14.3, iOS 17.3, and more, including a patch for the first in-the-wild exploited Apple vulnerability of 2024, as well as Stolen Device Protection for iPhone. Here is everything you need to know about the latest Apple updates.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-1st-in-the-wild-exploited-bug-of-2024-in-macos-sonoma-14-3-ios-17-3-and-more\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-25T07:44:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-26T05:09:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-400x260-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jay Vrijenhoek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-1st-in-the-wild-exploited-bug-of-2024-in-macos-sonoma-14-3-ios-17-3-and-more\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-400x260-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-400x260-1.png\",\"width\":400,\"height\":260,\"caption\":\"Apple software update red critical urgent actively exploited zero-day vulnerability\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-1st-in-the-wild-exploited-bug-of-2024-in-macos-sonoma-14-3-ios-17-3-and-more\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-1st-in-the-wild-exploited-bug-of-2024-in-macos-sonoma-14-3-ios-17-3-and-more\/\",\"name\":\"Apple patches 1st in-the-wild exploited bug of 2024 in macOS Sonoma 14.3, iOS 17.3 and more - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-1st-in-the-wild-exploited-bug-of-2024-in-macos-sonoma-14-3-ios-17-3-and-more\/#primaryimage\"},\"datePublished\":\"2024-01-25T07:44:58+00:00\",\"dateModified\":\"2024-01-26T05:09:46+00:00\",\"description\":\"Apple has released macOS Sonoma 14.3, iOS 17.3, and more, including a patch for the first in-the-wild exploited Apple vulnerability of 2024, as well as Stolen Device Protection for iPhone. Here is everything you need to know about the latest Apple updates.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-1st-in-the-wild-exploited-bug-of-2024-in-macos-sonoma-14-3-ios-17-3-and-more\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-1st-in-the-wild-exploited-bug-of-2024-in-macos-sonoma-14-3-ios-17-3-and-more\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-1st-in-the-wild-exploited-bug-of-2024-in-macos-sonoma-14-3-ios-17-3-and-more\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple patches 1st in-the-wild exploited bug of 2024 in macOS Sonoma 14.3, iOS 17.3 and more\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-1st-in-the-wild-exploited-bug-of-2024-in-macos-sonoma-14-3-ios-17-3-and-more\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-1st-in-the-wild-exploited-bug-of-2024-in-macos-sonoma-14-3-ios-17-3-and-more\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\"},\"headline\":\"Apple patches 1st in-the-wild exploited bug of 2024 in macOS Sonoma 14.3, iOS 17.3 and more\",\"datePublished\":\"2024-01-25T07:44:58+00:00\",\"dateModified\":\"2024-01-26T05:09:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-1st-in-the-wild-exploited-bug-of-2024-in-macos-sonoma-14-3-ios-17-3-and-more\/#webpage\"},\"wordCount\":2338,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-1st-in-the-wild-exploited-bug-of-2024-in-macos-sonoma-14-3-ios-17-3-and-more\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-400x260-1.png\",\"keywords\":[\"Apple TV\",\"iOS\",\"iOS 15\",\"iOS 16\",\"iOS 17\",\"macOS Monterey\",\"macOS Sonoma\",\"macOS Ventura\",\"Safari\",\"Security Updates\",\"watchOS\",\"watchOS 10\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-1st-in-the-wild-exploited-bug-of-2024-in-macos-sonoma-14-3-ios-17-3-and-more\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\",\"name\":\"Jay Vrijenhoek\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"caption\":\"Jay Vrijenhoek\"},\"description\":\"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Apple has released macOS Sonoma 14.3, iOS 17.3, and more, including a patch for the first in-the-wild exploited Apple vulnerability of 2024, as well as Stolen Device Protection for iPhone. Here is everything you need to know about the latest Apple updates.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-1st-in-the-wild-exploited-bug-of-2024-in-macos-sonoma-14-3-ios-17-3-and-more\/","og_locale":"en_US","og_type":"article","og_title":"Apple patches 1st in-the-wild exploited bug of 2024 in macOS Sonoma 14.3, iOS 17.3 and more - The Mac Security Blog","og_description":"Apple has released macOS Sonoma 14.3, iOS 17.3, and more, including a patch for the first in-the-wild exploited Apple vulnerability of 2024, as well as Stolen Device Protection for iPhone. Here is everything you need to know about the latest Apple updates.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-1st-in-the-wild-exploited-bug-of-2024-in-macos-sonoma-14-3-ios-17-3-and-more\/","og_site_name":"The Mac Security Blog","article_published_time":"2024-01-25T07:44:58+00:00","article_modified_time":"2024-01-26T05:09:46+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-400x260-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jay Vrijenhoek","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-1st-in-the-wild-exploited-bug-of-2024-in-macos-sonoma-14-3-ios-17-3-and-more\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-400x260-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-400x260-1.png","width":400,"height":260,"caption":"Apple software update red critical urgent actively exploited zero-day vulnerability"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-1st-in-the-wild-exploited-bug-of-2024-in-macos-sonoma-14-3-ios-17-3-and-more\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-1st-in-the-wild-exploited-bug-of-2024-in-macos-sonoma-14-3-ios-17-3-and-more\/","name":"Apple patches 1st in-the-wild exploited bug of 2024 in macOS Sonoma 14.3, iOS 17.3 and more - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-1st-in-the-wild-exploited-bug-of-2024-in-macos-sonoma-14-3-ios-17-3-and-more\/#primaryimage"},"datePublished":"2024-01-25T07:44:58+00:00","dateModified":"2024-01-26T05:09:46+00:00","description":"Apple has released macOS Sonoma 14.3, iOS 17.3, and more, including a patch for the first in-the-wild exploited Apple vulnerability of 2024, as well as Stolen Device Protection for iPhone. Here is everything you need to know about the latest Apple updates.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-1st-in-the-wild-exploited-bug-of-2024-in-macos-sonoma-14-3-ios-17-3-and-more\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-patches-1st-in-the-wild-exploited-bug-of-2024-in-macos-sonoma-14-3-ios-17-3-and-more\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-1st-in-the-wild-exploited-bug-of-2024-in-macos-sonoma-14-3-ios-17-3-and-more\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Apple patches 1st in-the-wild exploited bug of 2024 in macOS Sonoma 14.3, iOS 17.3 and more"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-1st-in-the-wild-exploited-bug-of-2024-in-macos-sonoma-14-3-ios-17-3-and-more\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-1st-in-the-wild-exploited-bug-of-2024-in-macos-sonoma-14-3-ios-17-3-and-more\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0"},"headline":"Apple patches 1st in-the-wild exploited bug of 2024 in macOS Sonoma 14.3, iOS 17.3 and more","datePublished":"2024-01-25T07:44:58+00:00","dateModified":"2024-01-26T05:09:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-1st-in-the-wild-exploited-bug-of-2024-in-macos-sonoma-14-3-ios-17-3-and-more\/#webpage"},"wordCount":2338,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-1st-in-the-wild-exploited-bug-of-2024-in-macos-sonoma-14-3-ios-17-3-and-more\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-400x260-1.png","keywords":["Apple TV","iOS","iOS 15","iOS 16","iOS 17","macOS Monterey","macOS Sonoma","macOS Ventura","Safari","Security Updates","watchOS","watchOS 10"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-patches-1st-in-the-wild-exploited-bug-of-2024-in-macos-sonoma-14-3-ios-17-3-and-more\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0","name":"Jay Vrijenhoek","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","caption":"Jay Vrijenhoek"},"description":"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.","url":"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-400x260-1.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-pUT","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/99627"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/79"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=99627"}],"version-history":[{"count":5,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/99627\/revisions"}],"predecessor-version":[{"id":99668,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/99627\/revisions\/99668"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/97207"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=99627"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=99627"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=99627"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}