Apple on Monday backported fixes for an actively exploited security flaw to more mature iPhone and iPad designs.
The issue, tracked as CVE-2023-23529, problems a style confusion bug in the WebKit browser engine that could guide to arbitrary code execution.
It was initially addressed by the tech huge with improved checks as part of updates released on February 13, 2023. An anonymous researcher has been credited with reporting the bug.

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.
Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).
➤ Activate Your Coupon Code
WEBINARDiscover the Concealed Risks of 3rd-Party SaaS Apps
Are you mindful of the hazards affiliated with 3rd-party application entry to your firm’s SaaS applications? Sign up for our webinar to study about the forms of permissions remaining granted and how to minimize risk.
RESERVE YOUR SEAT
“Processing maliciously crafted web content material could lead to arbitrary code execution,” Apple explained in a new advisory, including it truly is “informed of a report that this issue may well have been actively exploited.”
Particulars surrounding the precise nature of exploitation are currently not recognized, but withholding complex details is normal procedure as it assists avoid additional in-the-wild abuse targeting inclined units.
The update is readily available in versions iOS 15.7.4 and iPadOS 15.7.4 for iPhone 6s (all designs), iPhone 7 (all designs), iPhone SE (1st era), iPad Air 2, iPad mini (4th technology), and iPod touch (7th technology).
The disclosure will come as Apple rolled out iOS 16.4, iPadOS 16.4, macOS Ventura 13.3, macOS Monterey 12.6.4, macOS Significant Sur 11.7.5, tvOS 16.4, and watchOS 9.4 with numerous bug fixes.
Discovered this report exciting? Stick to us on Twitter and LinkedIn to go through additional exclusive content we post.
Some sections of this write-up are sourced from:
thehackernews.com