Multiple vulnerabilities have been discovered in Apple Products, the most severe of which could allow for arbitrary code execution.
* Safari is a graphical web browser developed by Apple.
* iOS is a mobile operating system for mobile devices, including the iPhone, iPad, and iPod touch.
* macOS Monterey is the 18th and release of macOS.
* macOS Big Sur is the 17th release of macOS.
* watchOS is the mobile operating system for Apple Watch and is based on the iOS operating system.
* iPadOS is the successor to iOS 12 and is a mobile operating system for iPads.
* macOS Ventura is the 19th and current major release of macOS
Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
Read more... Cyber Security Advisories - MS-ISAC