Apple has recently released new Rapid Security Response (RSR) patches to fix a zero-day vulnerability. This vulnerability has been exploited in attacks and affects iPhones, Macs, and iPads that have been fully patched.
The zero-day vulnerability has been tracked as CVE-2023-37450, and this vulnerability was identified by an anonymous cybersecurity researcher.
As a prompt response, Apple recently published a Rapid Security Responses (RSR) advisory for iOS and macOS.
The new Rapid Security Response (RSR) program if Apple rolls out a second patch, fixing a critical zero-day flaw across various Apple products like:-
Apple’s silence leaves the reason undisclosed, but Safari glitches emerged after user-agent detection failure for Zoom, Facebook, and Instagram, impacting website rendering.
Rapid Security Response updates swiftly deliver zero-day fixes for iPhones and Macs, prioritizing critical patches over regular OS updates for user protection.
RSR updates alter user agents on iOS devices, appending the “(a)” string to the new updates as follows:-
Soon after Apple’s patch release for CVE-2023-37450, users encountered access errors on several websites post-installation, prompting complaints.
Apple acknowledges Rapid Security Responses impacting website display, so they will soon fix it with the upcoming updates:-
While the users who have already installed the buggy security updates on their Apple devices and while browsing the web face any issues, make sure to remove the updates from your device.
To do so, you have to follow the simple steps that we have mentioned below:-
The below-mentioned steps are for Mac:-
Apple’s WebKit browser engine carries this zero-day flaw (CVE-2023-37450), enabling arbitrary code execution through targeted web pages with manipulated content.
In total, there are ten zero-day vulnerabilities that were fixed by Apple this year for its following product line:-
Here below, we have mentioned all the Zero-days fixed this year by Apple this year:-
Apple’s flawed Rapid Security Responses risk user resistance if issues persist, damaging the intended purpose of swift patch deployment.
Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti Connect…
A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing how…
EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of operational…
A sophisticated phishing campaign, dubbed "PoisonSeed," has been identified targeting customer relationship management (CRM) and…
A surge in phishing text messages claiming unpaid tolls has been linked to a massive…
The State Bar of Texas has confirmed a data breach following the detection of unauthorized…