iOS 16.3.1 arrived last week as a surprise as an update that fixed numerous vulnerabilities and security flaws. In fact, Apple strongly encouraged all users to update their devices, even releasing updates for older versions fixing these bugs in other versions of iOS. But before giving more information on these Exploits closed, the big apple wanted to let a few days pass before a large number of users updated. Today the glossary of updated security vulnerabilities has already been updated and we also see iOS 16.3 is no longer signed with which Apple “forces” to install iOS 16.3.1.
Apple updates vulnerabilities fixed in iOS 16.3.1
As we said, Apple released iOS 16.3.1 on February 13 and since then we have little news about the security flaws fixed in the update. We know for sure that the issues with the WebKit SDK and the vulnerabilities associated with the kernel have been fixed. However, More patched vulnerabilities are known that Apple has yet to publicly disclose.
Related article:
Apple releases iOS 16.3.1 and watchOS 9.3.1 in addition to HomePodOS 16.3.2
In fact, a few hours ago the Big Apple website was updated with more information about the security flaws fixed with the update. And this time they added the Exploits of security. This is an exploit reported by the Google Chrome team that has appeared since iPhone 8 and above and almost all generations of iPad.
Others have also been added three new vulnerabilities, two of them were associated with the Foundation development kit which allowed the execution of arbitrary code outside the sandbox or with certain elevated privileges. Another security flaw involved the Cash Reporter kit, which allowed hackers to read files with root privileges. What we do know for sure is that Apple wanted to hit the table by addressing serious security issues in a new release that it hopes will gain high adoption as soon as possible.