Just a day after journalists got their hands on Apple’s Vision Pro, the tech giant wasted no time in rolling out a security patch for the mixed reality headset. This patch aims to fix a flaw that potential hackers could have used in the wild.
Apple recently rolled out Vision OS 1.0.2, the latest software update for the Vision Pro. This update addresses a vulnerability in WebKit, the browser engine that powers Safari and other web applications. Apple has acknowledged the presence of a bug that, if taken advantage of, could potentially enable the execution of malicious code on a device that is affected.
Apple recently addressed a vulnerability in its latest update, iOS 17.3. This update covered various Apple devices such as iPhones, iPads, Macs, and Apple TV, all of which depend on WebKit. Apple Watch did not receive any official patches for the bug, which is tracked as CVE-2024-23222.
It is still unclear whether malicious hackers used the vulnerability to target Apple’s Vision Pro. When asked for more information by Apple spokesperson Scott Radcliffe, he declined.
The identity of the individual or group responsible for exploiting the vulnerability remains unknown, leaving their motives shrouded in mystery.
Malicious actors often set their sights on exploiting vulnerabilities in WebKit to gain unauthorized access to the device’s operating system and the user’s personal data. This is a concerning issue that needs to be addressed. Exploiting WebKit bugs can pose a serious threat to users who unknowingly stumble upon a malicious domain while browsing or using the in-app browser.