{"id":22439,"date":"2023-07-11T16:11:25","date_gmt":"2023-07-12T00:11:25","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/07\/11\/news-16169\/"},"modified":"2023-07-11T16:11:25","modified_gmt":"2023-07-12T00:11:25","slug":"news-16169","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2023\/07\/11\/news-16169\/","title":{"rendered":"Apple issues Rapid Security Response for zero-day vulnerability"},"content":{"rendered":"<p>Apple has issued an update for a vulnerability which it says may have been actively exploited.<\/p>\n<p>In the <a href=\"https:\/\/support.apple.com\/en-us\/HT213826\" target=\"_blank\" rel=\"nofollow\">security content for Safari 16.5.2<\/a> we can learn that the vulnerability was found in the WebKit component which is Apple&rsquo;s web rendering engine. In other words, WebKit is the browser engine that powers Safari and other apps. On iOS and iPadOS even third-party browsers have to use WebKit under the hood. So, it&rsquo;s no surprise that this update is available for a range of operating systems (OSs).<\/p>\n<table border=\"1\" cellspacing=\"0\" cellpadding=\"5\" style=\"margin-left: auto; margin-right: auto;\">\n<tbody>\n<tr>\n<td valign=\"top\">\n<p>&nbsp;&nbsp;<a href=\"https:\/\/support.apple.com\/kb\/HT213826\" target=\"_blank\" rel=\"nofollow\">Safari 16.5.2<\/a>&nbsp;<\/p>\n<\/td>\n<td valign=\"top\">\n<p>&nbsp;&nbsp;macOS Big Sur and macOS Monterey<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">\n<p>&nbsp;&nbsp;<a href=\"https:\/\/support.apple.com\/kb\/HT213823\" target=\"_blank\" rel=\"nofollow\">Rapid Security Response iOS 16.5.1 (a) &amp; iPadOS 16.5.1 (a)<\/a>&nbsp;<\/p>\n<\/td>\n<td valign=\"top\">\n<p>&nbsp;&nbsp;iOS 16.5.1 and iPadOS 16.5.1<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">\n<p>&nbsp;&nbsp;<a href=\"https:\/\/support.apple.com\/kb\/HT213825\" target=\"_blank\" rel=\"nofollow\">Rapid Security Response macOS Ventura 13.4.1 (a)<\/a>&nbsp;<\/p>\n<\/td>\n<td valign=\"top\">\n<p>&nbsp;&nbsp;macOS Ventura 13.4.1<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>For most users, no action is required. Apple devices are configured to implement Rapid Security Responses as the default setting automatically. If needed, users will receive a prompt to restart their device.<\/p>\n<p>Rapid Security Response (RSR) is a new type of software patch delivered between Apple&#8217;s regular, scheduled software updates. Previously, Apple security fixes came bundled along with features and improvements, but RSRs only carry security fixes. They&#8217;re meant to make the deployment of security improvements faster and more frequent. According to an Apple notice about RSRs, the new updates &#8220;may also be used to mitigate some security issues more quickly, such as issues that might have been exploited or reported to exist &#8216;in the wild&#8217;.&#8221; <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/05\/apple-releases-first-rapid-security-response-update-for-ios-ipados-and-macos-users\">RSR was first introduced in May of 2023<\/a>.<\/p>\n<p>To check whether you have RSR enabled, select System Settings. In the <strong>Settings<\/strong> window, click on (General and Software) <strong>Update<\/strong>, then <strong>Automatic Updates<\/strong>, and make sure the toggle is turned on for <strong>Install Security Responses and system files<\/strong>.<\/p>\n<p>It may be important to note that the first attempt to patch this vulnerability, offered as iOS 16.5.1 (a), <a href=\"https:\/\/www.forbes.com\/sites\/kateoflahertyuk\/2023\/07\/11\/apple-pulls-ios-1651-a-heres-what-to-do\/?sh=646781b85534\" target=\"_blank\" rel=\"nofollow\">reportedly<\/a> broke some sites. This first attempt was pulled hours after release. Apple then followed up with this latest update.<\/p>\n<p>The Common Vulnerabilities and Exposures (CVE) database lists publicly disclosed computer security flaws. The CVE patched in this updates is:<\/p>\n<p><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-37450\" target=\"_blank\" rel=\"nofollow\">CVE-2023-37450<\/a>: Processing web content may lead to arbitrary code execution. The issue was addressed with improved checks.<\/p>\n<p>While Apple doesn&#8217;t disclose, discuss, or confirm security issues until a patch is made available and users have had the opportunity to apply them, what we can conclude from that description is that the bug could be used for drive-by downloads as it might allow an attacker to execute arbitrary code by tricking users into opening web pages containing specially crafted content.<\/p>\n<hr \/>\n<p><strong>We don&rsquo;t just report on vulnerabilities&mdash;we identify them, and prioritize action.<\/strong><\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Keep vulnerabilities in tow by using <a href=\"https:\/\/www.malwarebytes.com\/business\/vulnerability-patch-management\">Malwarebytes Vulnerability and Patch Management<\/a>.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/07\/apple-issues-rapid-security-response-for-zero-day-vulnerability\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding=\"10\">\n<tr>\n<td valign=\"top\" align=\"left\">\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/exploits-and-vulnerabilities\" rel=\"category tag\">Exploits and vulnerabilities<\/a><\/p>\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/news\" rel=\"category tag\">News<\/a><\/p>\n<p>Tags: Apple<\/p>\n<p>Tags:  Safari<\/p>\n<p>Tags:  WebKit<\/p>\n<p>Tags:  macOS<\/p>\n<p>Tags:  iOS<\/p>\n<p>Tags:  iPadOs<\/p>\n<p>Tags:  CVE-2023-37450<\/p>\n<p>Tags:  drive-by<\/p>\n<p>Tags:  code execution<\/p>\n<p>Apple has issued an update for a zero-day vulnerability in the WebKit browser engine which may be actively exploited.<\/p>\n<table width=\"100%\">\n<tr>\n<td align=\"right\">\n<p><b>(<a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/07\/apple-issues-rapid-security-response-for-zero-day-vulnerability\" title=\"Apple issues Rapid Security Response for zero-day vulnerability\">Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/07\/apple-issues-rapid-security-response-for-zero-day-vulnerability\">Apple issues Rapid Security Response for zero-day vulnerability<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[2211,11909,29782,17486,22783,10480,24749,10403,32,10543,10753],"class_list":["post-22439","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-apple","tag-code-execution","tag-cve-2023-37450","tag-drive-by","tag-exploits-and-vulnerabilities","tag-ios","tag-ipados","tag-macos","tag-news","tag-safari","tag-webkit"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22439","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=22439"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22439\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=22439"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=22439"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=22439"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}