Apple has now acknowledged the potentially critical vulnerability CVE-2022-22620, proven by an anonymous entity to increase the risk that arbitrary code from malicious websites could execute on unsuspecting iPhones or iPads via WebKit. The OEM has conceded that this methodology could well have been enacted in active units to date.
This, apparently, could have happened even after the 15.3 firmware updates intended to crush a range of additional CVEs; therefore, Apple has now released a further minor upgrade: 15.3.1. It is rated to fix this lingering security issue, which applies to a fairly wide range of mobile devices from the Cupertino giant, from iPhones of the 6 series or later and all iPads Pro to the 7th-gen iPod Touch.
Apple has also issued new watchOS 8.4.2 and macOS 12.2.1 updates to mirror these security patches. In the case of the Monterey update, it may also address a Bluetooth-related battery-drain phenomenon experienced by some Mac users.
Buy an M1 MacBook Pro on Amazon