AppleInsider might earn an affiliate fee on purchases made by hyperlinks on our web site.
Apple mounted a possible privateness vulnerability with iOS 16.3 and different updates, however its investigation into an allegation concluded that no apps took benefit of the flaw.
In response to a report from February 1, there was a safety vulnerability in Apple Maps that might have allegedly allowed an app to bypass a consumer’s privateness controls.
A blogger had claimed not less than one agency had exploited the flaw, based mostly on a reader who believed {that a} native firm was monitoring his location on iOS 16.2.
Particularly, the iFood app was stated to have been monitoring the consumer. Even on the time of the report, it wasn’t clear if this was the case, which, presumably, is why Apple began wanting into the matter.
In a Friday assertion to AppleInsider and different venues, Apple stated that iOS was by no means in danger, and the app did not circumvent privateness controls set by customers.
At Apple, we firmly imagine customers ought to select when to share their information and with whom. Final week we issued an advisory for a privateness vulnerability that might solely be exploited from unsandboxed apps on macOS. The codebase that we mounted is shared by iOS and iPadOS, tvOS, and watchOS, so the repair and advisory was propagated to these working techniques as effectively, even supposing they have been by no means in danger.
The suggestion that this vulnerability might have allowed apps to bypass consumer controls on iPhone is fake.
A report additionally incorrectly prompt an iOS app was exploiting this or one other vulnerability to bypass consumer management over location information. Our observe up investigation concluded that the app was not circumventing consumer controls by any mechanism.
Apple has a internet web page that lists varied safety updates for the most recent variations of its working techniques.