Interesting that they’re mentioned as only being exploited on Intel. Has anyone seen whether that’s because the attacker only targeted that platform or is it actually stopped by something like pointer protection?
replies(3):
Unless they're assuming it's exploitable on Apple Silicon as well, or are being extra careful just in case.
Is kinda weasel-wordy, if you read it with sufficient cynicism.
Its doesn't rule out them also being aware of reports (or actual instances) of it being exploited on iOS or Apple silicon Macs.
It _might_ actually mean "Apple could not deny in a lawsuit that it's been sent a report of this being exploited on Intel Macs."