"Apple's Rapid Zero-Day Patch Causes Safari Issues, Users Say"

Less than 24 hours after releasing an emergency patch for a zero-day security flaw being actively exploited in the wild, Apple's patch rollout is reported to have broken certain websites in Safari. Apple's WebKit browser engine contains the flaw, tracked as CVE-2023-37450, that enables arbitrary code execution on patched iPhones, Macs, and iPads. It can be exploited in drive-by attacks by luring targets to websites containing malicious code. This vulnerability can be exploited in drive-by attacks by luring targets to booby-trapped websites. The company's Rapid Security Response (RSR) offered updates to all three operating systems and the browser itself. However, users began to report browser malfunctions following the installation of the patches. According to posts in the official macOS Support Community and the MacRumors user forum, Facebook, Instagram, WhatsApp, Zoom, and other applications began throwing "Unsupported Browser" errors in Safari after the updates were implemented. This article continues to discuss the bug found in Apple's WebKit browser engine and the issues caused by the emergency fix.

Dark Reading reports "Apple's Rapid Zero-Day Patch Causes Safari Issues, Users Say"

Submitted by Anonymous on