In a proactive move to fortify the security of its upcoming Vision Pro headset, Apple has rolled out a crucial update to its visionOS. The visionOS Version 1.0.2, with a primary focus on fixing a WebKit vulnerability, addresses a potential risk of active exploitation.
Key Details of the Update:
- visionOS Version: 1.0.2
- Security Focus: WebKit vulnerability fix
- Concern: Possible active exploitation
- Prior Update: visionOS 1.0.1
- Issue Addressed: Type confusion with improved checks
- CVE-ID: CVE-2024-23222
- Day One Update: Vision Pro owners strongly advised to install the update immediately upon receiving their headsets
This preemptive measure, released just two days before the official launch of the Vision Pro, underscores Apple’s commitment to user security and privacy. Members of the media who have received review units are encouraged to install the update promptly, ensuring a seamless experience when evaluating the new product.
The day one update for Vision Pro owners is scheduled for this Friday, coinciding with the official release of the groundbreaking headset. This approach aligns with Apple’s strategy of ensuring that users have the latest security measures in place from the moment they start using their devices.
- The update precedes the Vision Pro launch, reflecting Apple’s dedication to addressing potential vulnerabilities swiftly.
- Members of the media equipped with review units have the opportunity to experience the enhanced security measures firsthand.
- Vision Pro owners can anticipate a smooth onboarding experience with the day one update, reinforcing Apple’s commitment to user satisfaction.
Looking ahead, Apple hints at the release of visionOS 2 at the Worldwide Developers Conference (WWDC) in June, promising new and advanced features to further elevate the user experience.
Security Measures and User Protection:
- Apple adheres to a policy of non-disclosure until thorough investigations and patches are available.
- Security details are intentionally withheld pre-resolution to safeguard customer interests.
- Users are urged to stay informed by regularly checking Apple’s security releases page for the latest updates.
- CVE-IDs are provided for referenced vulnerabilities whenever possible.