Safari users easily hacked. Mac users advised to switch browser due to Safaris constant holes and slow time between security fixes.

CERT-In has issued a warning to MacBook users after identifying a bug that poses a high risk to Mac users, following Apple’s iOS 16.5.1 update. The vulnerability in Apple Safari could enable remote attackers to execute arbitrary code on targeted systems, according to the cybersecurity watchdog.

CERT-In, the government’s cybersecurity watchdog, has issued a warning specifically aimed at MacBook users, following Apple’s release of the iOS 16.5.1 update. This update addressed two significant security vulnerabilities and introduced additional features for iPhones. However, CERT-In has identified a bug that poses a substantial risk to Mac users, giving it a high severity rating.

The government body has released information regarding a recently discovered security flaw, identified as CVE-2023-32439, which affects versions of Apple Safari prior to 16.5.1 on macOS Monterey. According to the CERT-In, this vulnerability in Apple Safari has the potential to enable remote attackers to execute arbitrary code on targeted systems. 

CERT-In further explains that the presence of this vulnerability in Apple Safari is a result of a confusion error within the WebKit component. Additionally, CERT-In highlights that attackers can exploit this flaw by convincing victims to open a specifically crafted file or application.

CERT-In further explains that the presence of this vulnerability in Apple Safari is a result of a confusion error within the WebKit component. Additionally, CERT-In highlights that attackers can exploit this flaw by convincing victims to open a specifically crafted file or application.

By Jonna N

One thought on “Safari users easily hacked. Mac users advised to remove browser.”
  1. Does your blog have a contact page? I’m having problems locating it but, I’d like to shoot you an email. I’ve got some recommendations for your blog you might be interested in hearing.

Leave a Reply

Your email address will not be published. Required fields are marked *