Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Endpoint Security

Apple Patches Over 100 Vulnerabilities With Release of macOS Ventura 13

Apple on Monday announced the official launch of macOS Ventura 13, the 19th major release of its desktop operating system. In addition to several new features, macOS Ventura 13 brings patches for more than 100 vulnerabilities. 

Apple on Monday announced the official launch of macOS Ventura 13, the 19th major release of its desktop operating system. In addition to several new features, macOS Ventura 13 brings patches for more than 100 vulnerabilities. 

A total of 112 CVE identifiers are listed in Apple’s security advisory for macOS Ventura 13, including issues that are specific to the operating system and flaws impacting third-party components.

Exploitation of these vulnerabilities can lead to arbitrary code execution, information disclosure, denial-of-service (DoS), file system modifications, security bypasses, and privilege escalation.

Exploitation in many cases requires deploying malicious applications on the targeted system. In some cases, an attack would require physical access to the device or processing malicious files.

Apple on Monday also released macOS Big Sur (11.7.1) and Monterey (12.6.1) updates, which patch three of the vulnerabilities fixed by Ventura 13.

Some of the Webkit vulnerabilities patched with the release of Ventura 13 were also addressed in the Safari web browser. 

Apple on Monday also announced patching more than 20 security holes with the release of iOS and iPadOS updates, including CVE-2022-42827, a zero-day that has been exploited in attacks. No information has been made available on the attacks exploiting CVE-2022-42827.

Related: Apple Finally Patches Exploited Vulnerabilities in macOS Big Sur, Catalina

Related: Apple Patches New macOS, iOS Zero-Days

Related: Apple Patch Day: Gaping Security Holes in iOS, macOS, iPadOS

Related: Apple Warns of macOS Kernel Zero-Day Exploitation

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.

Register

Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.

Register

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Vulnerabilities

Apple has released updates for macOS, iOS and Safari and they all include a WebKit patch for a zero-day vulnerability tracked as CVE-2023-23529.

Application Security

Drupal released updates that resolve four vulnerabilities in Drupal core and three plugins.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Vulnerabilities

GoAnywhere MFT users warned about a zero-day remote code injection exploit that can be targeted directly from the internet