Skip to content
Thoughtful, detailed coverage of everything Apple for 34 years
and the TidBITS Content Network for Apple professionals
20 comments

Rapid Security Responses for iOS/iPadOS 16.5.1 (c) and macOS Ventura 13.4.1 (c)

Let’s try this again. Apple has rereleased Rapid Security Response updates for iOS 16.5.1 (c), iPadOS 16.5.1 (c), and macOS Ventura 13.4.1 (c) to fix a WebKit vulnerability that could allow malicious Web content to execute arbitrary code. The vulnerability is being actively exploited, and despite the website loading issues with Safari in the previous versions, I encourage you to install these updates as soon as feasible. They loaded quickly, in under 4 minutes on each of my devices, including the necessary restart.

In the event of problems, remember that you can uninstall Rapid Security Responses (but not regular updates) just as quickly as you install them (see “What Are Rapid Security Responses and Why Are They Important?” 2 May 2023).

  • iPhone or iPad: Navigate to Settings > General > About > iOS Version, and then tap Remove Security Response. Tap Remove to confirm.
  • Mac: Go to System Settings > General > About, click the ⓘ next to the macOS version, click Remove & Restart, and confirm the action.

The new versions fix an issue that prevented a few websites from displaying properly in Safari by changing its user agent identifier to remove the parenthetical letter that seems to have confused sites like Facebook and Instagram. Apple also incremented Safari’s build number.

Safari 16.5.2 user agents
To see the User Agent options above, enable the Develop menu in Safari > Settings > Advanced, then look in the Develop > User Agent menu.

While Apple’s choice of letters for Rapid Security Response version numbers is questionable, Meta and other companies whose websites were affected also bear responsibility for not failing gracefully when encountering unexpected user agent identifiers.

Let us know in the comments if you experience any other issues associated with the Rapid Security Response updates.

Subscribe today so you don’t miss any TidBITS articles!

Every week you’ll get tech tips, in-depth reviews, and insightful news analysis for discerning Apple users. For over 33 years, we’ve published professional, member-supported tech journalism that makes you smarter.

Registration confirmation will be emailed to you.

This site is protected by reCAPTCHA. The Google Privacy Policy and Terms of Service apply.

Comments About Rapid Security Responses for iOS/iPadOS 16.5.1 (c) and macOS Ventura 13.4.1 (c)

Notable Replies

  1. On iPhone 13 mini it took 3 min 20 sec
    About same on MBP 16 inch 2021

  2. blm

    Well, there now seems to be a (c) security response. Now sure what happened to (b), but (c) is downloading on my iPhone as we speak.

  3. Might anyone installed " macOS Ventura 13.4.1 (c)" and come to realize that there are no issues with this version?

    I am usually quite wary of installing system updates but not security updates, until I was away from my MBP for 24 hours and then saw that earlier versions of this security update had problems………

    Thank you!

  4. I cannot install it personally, but have heard from a few users and several ITs responsible for hundreds of Macs that they have not seen any issues yet.

  5. I have it installed and see no issues, but I never had issues with the first installation on iPhone, iPad or Mac.

  6. blm

    It installed for me and I haven’t seen any issues, but I didn’t have any issues with (a) either, so my experience might not be indicative…

  7. So that’s 2 IIRC of I’m not sure how many RSRs that have had problems. (I don’t have it switched on).

    Many of us here pause before installing updates, just to let things settle and not be on the bleeding edge of chaos. Tidbits editors often recommend exactly that.

    The whole RSR thing needed to be bullet proof to build confidence… and it just isn’t. “It just (doesn’t) work(s)”, as it were.

    I wonder what the actual split in Tidbits is of those that install everything immediately (or let it be installed by those things that autoupdate), and those that don’t?

  8. Mark my words, this incessant push to get people to install each and every update ASAP is going to get even stronger with RSRs along the lines of “well you can always remove the RSR again if it gives you trouble”.

    By now we’re essentially being coerced to weekly reboot our systems because of supposed “threats in the wild” and SSV and updates to the update, yada yada. It’s almost as if we’re celebrating that we’ve successfully traveled back to 1990 with its “have you tried rebooting it?” and selling this malarkey with “but hey it’s only 5 minutes instead of the 45 it took with Big Sur”. I’m not a fan at all.

  9. No, there have been only two RSRs ever, and there were no problems with the first one.

    It’s certainly a shame that on the second try, there were problems. It’s not clear to me that they were exactly Apple’s fault though—it sure looks like it was websites being sloppy in how they determined user agents and reacted to failures.

    Seems to me that there are three possible ways forward:

    • People get suspicious about updates, don’t install regularly, and have only themselves to blame if their devices are compromised by malware bots. But Apple won’t be happy about this because of (a) legitimately wanting to protect users and (b) the bad PR that comes once Apple devices are being compromised more seriously.

    • People install the updates shortly after they’re made available and retain control over when that happens.

    • Apple eventually determines the risks are too great and too few people are installing the updates, so it moves toward a system that automatically updates without the user having a say in the matter.

    I can’t speak to the sort of attacks that Apple is defending against from personal knowledge, but Lauri and I have spent non-trivial amounts of time over the past week fighting off literally hundreds of spam accounts created in our WordPress system by Russian spambots that are evading the protections in our Stop Spammers plugin and even sometimes the new email verification plugin I added to the account creation process. At least we got things set up properly with Stripe to prevent these spambot accounts from using our membership system to test stolen credit cards. Refunding a few hundred illicit charges was not fun.

    It’s easy for users to think that there aren’t significant security risks out there because, for the most part, everything just works. But the reason it just works is that there is a HUGE amount of work being done to block an insane level of nonstop attacks. It’s easy to scale bot attacks, and the attackers don’t care if they have a very low success rate. All it takes is that one unpatched device and they can get a toehold that could turn into something big, like the LastPass breach, which involved two individuals being compromised, one after another.

  10. The security update did not install on two MacMini‘s running Ventura 13.4.1. The (german) message was „could not personalise the update“. Several retries (also after reboots) have not changed the result. Any clue why this doesn‘t work?
    P.S.: on my iPhone and iPad the update succeeded flawlessly

  11. To me, not working with Facebook and Instagram would be a feature, not a bug. :sweat_smile:

  12. No, I’ve not heard of anyone else having that issue. Do you have an unusual iCloud/Apple ID setup in some way?

  13. Many thanks for looking into this, Adam! I am not sure whether my AppleID setup is very unusual: there are two regular users (i.e. without admin privileges), each with their individual AppleID. Then there is the admin user without an AppleID: for system administration tasks, one of the regular users enters the admin credentials. Both users make minimal use of iCloud: the only shared items are calendar, contacts, notes and books, and the “find my Mac”-service. For the security update, I provided the admin user with my AppleID, but only to get the same error message “update could not be personalised.”

    I am travelling these days, but will be back home Friday to make another attempt. Cheers from Switzerland :switzerland:

  14. Honestly, the only admin user not having an associated Apple ID does sound unusual because you’re combining higher permissions (admin access locally) with lower permissions (no automatic authentication to Apple). It should work, but it feels like an edge case that could run into trouble.

  15. It is a sort of setup that I have been using since over twenty years - actually long before AppleID or iCloud existed. Just to be sure, I now have created a new AppleID for the admin and have tried the security update from that account, still to no avail. This is the error message (unfortunately in German):

    Bildschirmfoto 2023-07-20 um 15.17.33.png

    The translation: "The software update could not be personalized. Try again. An error occurred while loading the selected updates. Check your internet connection and try again.“

    Hmm, I don’t know what to try next. May be a system recovery? Any other suggestion?

    Many thanks!

  16. Do you have an iPhone or other smartphone that can create a personal hotspot? What happens if you put the Mac on a completely different Internet connection?

    If it were me, I’d just wait until the next full release of Ventura, but that’s partly because I don’t use Safari. If you can use another browser, you have essentially nothing to worry about.

  17. Sounds like you haven’t tried to install the update in Safe Mode. That has been found to work for some users that have unexplained issues.

    I will admit that I’ve never run across anybody that got that specific error message saying it “could not be personalized”.

  18. Many thanks for your suggestions. I first tried to install in “Safe Mode”, but obtained the same weird error message. Then I followed your suggestion, Adam, and connected to my iPhone-hotspot: that did the trick! Congratulations!

    Now I am at a complete loss what in my network configuration may have prevented the update: my macs are connected by LAN to a Fritz!Box 4040, which has an ADSL-line to my provider. Probably unusual in my setup: I also have a permanent VPN-tunnel to another, remote Fritz!Box. Adam, what made you think that it might be my network configuration, and any hints what might be wrong? All my other internet traffic seems to run fine…

    In any case, many thanks for all your help, and for providing Tidbits to the community!

  19. That VPN tunnel is where I’d look. There may be some combination of IP address masking or changes that Apple’s update server doesn’t like. (And I realize that’s a lot of hand waving. :slight_smile: )

  20. In the meantime, I found some other posts of people with the same issue of failing updates which “could not be personalized.” It seems that mainly Macs with the M1-chip are affected. I encountered the issue again with the recent update to Ventura 13.5.1. I finally could install that update using “Recovery Mode” (“Safe mode” also failed). This, however, seems to indicate that it is not my network setup which is the culprit…
    Best regards from Switzerland!

Join the discussion in the TidBITS Discourse forum

Participants

Avatar for ace Avatar for Simon Avatar for mac Avatar for alvarnell Avatar for nootski Avatar for ddmiller Avatar for blm Avatar for lalicata Avatar for john23 Avatar for m.vonkienlin