A timing side-channel issue was addressed with improvements to constant-time computation in cryptographic functions. This issue is fixed in iOS 16.7.6 and iPadOS 16.7.6, iOS 17.3 and iPadOS 17.3, macOS Monterey 12.7.4, macOS Sonoma 14.3, macOS Ventura 13.6.5, tvOS 17.3, watchOS 10.3. An attacker may be able to decrypt legacy RSA PKCS#1 v1.5 ciphertexts without having the private key.
http://seclists.org/fulldisclosure/2024/Jan/40
http://seclists.org/fulldisclosure/2024/Jan/39
https://support.apple.com/kb/HT214085
https://support.apple.com/kb/HT214083
https://support.apple.com/kb/HT214082
https://support.apple.com/kb/HT214061
https://support.apple.com/kb/HT214059
https://support.apple.com/kb/HT214055
https://support.apple.com/en-us/HT214061
https://support.apple.com/en-us/HT214060
https://support.apple.com/en-us/HT214059
https://support.apple.com/en-us/HT214055
https://support.apple.com/en-us/120886
https://support.apple.com/en-us/120884
https://support.apple.com/en-us/120880
https://support.apple.com/en-us/120311
https://support.apple.com/en-us/120309
https://support.apple.com/en-us/120306
https://support.apple.com/en-us/120304