Home Gadgets Apple watchOS 10.3 Update: Download and New Features

Apple watchOS 10.3 Update: Download and New Features

Apple has released the third major update for watchOS 10. The Cupertino-based tech giant has started rolling out the watchOS 10.3 update. The new OS update consists of a new Unity Bloom watch face. The new Apple Watch face was released to celebrate the Black History month.

How to download the update
To download the watchOS 10.2 update, begin by accessing the Apple Watch app on your iPhone. Navigate to the “General” section and choose “Software Update.” It is crucial to verify that your Apple Watch has a minimum of 50 percent battery charge, is connected to a charger, and remains in proximity to the paired iPhone throughout the installation of the updated software.

What the watchOS 10.3 update offers
Here’s the complete changelog of the update

Apple Neural Engine
Available for devices with Apple Neural Engine: Apple Watch Series 9 and Apple Watch Ultra 2
Impact: An app may be able to execute arbitrary code with kernel privileges
Description: The issue was addressed with improved memory handling.
CVE-2024-23212: Ye Zhang of Baidu Security

CoreCrypto

Expand

Available for: Apple Watch Series 4 and later
Impact: An attacker may be able to decrypt legacy RSA PKCS#1 v1.5 ciphertexts without having the private key
Description: A timing side-channel issue was addressed with improvements to constant-time computation in cryptographic functions.
CVE-2024-23218: Clemens Lang

Kernel
Available for: Apple Watch Series 4 and later
Impact: An app may be able to execute arbitrary code with kernel privileges
Description: The issue was addressed with improved memory handling.
CVE-2024-23208: fmyy(@binary_fmyy) and lime From TIANGONG Team of Legendsec at QI-ANXIN Group

Mail Search
Available for: Apple Watch Series 4 and later
Impact: An app may be able to access sensitive user data
Description: This issue was addressed with improved redaction of sensitive information.
CVE-2024-23207: Noah Roskin-Frazee and Prof. J. (ZeroClicks.ai Lab), and Ian de Marcellus

NSSpellChecker
Available for: Apple Watch Series 4 and later
Impact: An app may be able to access sensitive user data
Description: A privacy issue was addressed with improved handling of files.
CVE-2024-23223: Noah Roskin-Frazee and Prof. J. (ZeroClicks.ai Lab)

Safari
Available for: Apple Watch Series 4 and later
Impact: A user’s private browsing activity may be visible in Settings
Description: A privacy issue was addressed with improved handling of user preferences.
CVE-2024-23211: Mark Bowers

Shortcuts
Available for: Apple Watch Series 4 and later
Impact: A shortcut may be able to use sensitive data with certain actions without prompting the user
Description: The issue was addressed with additional permissions checks.
CVE-2024-23204: Jubaer Alnazi (@h33tjubaer)

Shortcuts
Available for: Apple Watch Series 4 and later
Impact: An app may be able to bypass certain Privacy preferences
Description: A privacy issue was addressed with improved handling of temporary files.
CVE-2024-23217: Kirin (@Pwnrin)

TCC
Available for: Apple Watch Series 4 and later
Impact: An app may be able to access user-sensitive data
Description: An issue was addressed with improved handling of temporary files.
CVE-2024-23215: Zhongquan Li (@Guluisacat)

Time Zone
Available for: Apple Watch Series 4 and later
Impact: An app may be able to view a user’s phone number in system logs
Description: This issue was addressed with improved redaction of sensitive information.
CVE-2024-23210: Noah Roskin-Frazee and Prof. J. (ZeroClicks.ai Lab)

WebKit
Available for: Apple Watch Series 4 and later
Impact: A maliciously crafted webpage may be able to fingerprint the user
Description: An access issue was addressed with improved access restrictions.
WebKit Bugzilla: 262699
CVE-2024-23206: an anonymous researcher

WebKit
Available for: Apple Watch Series 4 and later
Impact: Processing web content may lead to arbitrary code execution
Description: The issue was addressed with improved memory handling.
WebKit Bugzilla: 266619
CVE-2024-23213: Wangtaiyu of Zhongfu info

 

Reference

Denial of responsibility! TechCodex is an automatic aggregator of Global media. In each content, the hyperlink to the primary source is specified. All trademarks belong to their rightful owners, and all materials to their authors. For any complaint, please reach us at – [email protected]. We will take necessary action within 24 hours.
DMCA compliant image

Leave a Comment