Apple releases iOS 9.2.1 with bug fixes and security updates

BY Gautam Prabhu

Published 19 Jan 2016

iOS 9.2 logo

Apple has released iOS 9.2.1 (build number: 13D15) for iPhone, iPad and iPod touch to the public, a week after releasing the first beta version of iOS 9.3 to developers.

Apple seeded the first beta of iOS 9.2.1 on December 16, following the second beta finding its way to developers and public testers back on January 4. iOS 9.2, for its part, was a minor update on its own, fixing several behind-the-scenes things, improving performance, and otherwise improving the overall system.

According to the release notes, iOS 9.2.1 contains security updates and bug fixes including a fix for an issue that could prevent the completion of app installation when using a MDM service.  So far, the betas have not revealed any major forward-facing changes to the software.

Meanwhile, Apple has also seeded iOS 9.3 to developers and public beta testers, which includes number of new features such as Night Shift, password protected Notes, revamped News app, new 3D Touch Quick Actions and lots more.

Jailbreakers should avoid upgrading their jailbroken device to iOS 9.2.1 as you will lose the jailbreak.

If you don’t care about jailbreaking, then you can install iOS 9.2.1 via OTA update by going to Settings > General > Software Update. The size of the OTA update on the iPhone 6s Plus is 41.1 MB.

Update 1

If you’re not getting the update via OTA update then you can download the appropriate iOS 9.2.1 IPSW file for your device from the links provided below. You can check your iPhone, iPad or iPod touch’s back cover for the model number to download the appropriate download link.

iOS 9.2.1 download links for iPhone

iOS 9.2.1 (iPhone 4S): iPhone4,1_9.2.1_13D15_Restore.ipsw
iOS 9.2.1 (iPhone 5 GSM): iPhone5,1_9.2.1_13D15_Restore.ipsw
iOS 9.2.1 (iPhone 5 GSM+CDMA): iPhone5,2_9.2.1_13D15_Restore.ipsw
iOS 9.2.1 (iPhone 5s GSM): iPhone6,1_9.2.1_13D15_Restore.ipsw
iOS 9.2.1 (iPhone 5s GSM+CDMA): iPhone6,2_9.2.1_13D15_Restore.ipsw
iOS 9.2.1 (iPhone 5c GSM): iPhone5,3_9.2.1_13D15_Restore.ipsw
iOS 9.2.1 (iPhone 5c GSM+CDMA): iPhone5,4_9.2.1_13D15_Restore.ipsw
iOS 9.2.1 (iPhone 6 Plus): iPhone7,1_9.2.1_13D15_Restore.ipsw
iOS 9.2.1 (iPhone 6): iPhone7,2_9.2.1_13D15_Restore.ipsw
iOS 9.2.1 (iPhone 6s): iPhone8,1_9.2.1_13D15_Restore.ipsw
iOS 9.2.1 (iPhone 6s Plus): iPhone8,2_9.2.1_13D15_Restore.ipsw

iOS 9.2.1 download links for iPad

iOS 9.2.1 (iPad 2 Wi-Fi): iPad2,1_9.2.1_13D15_Restore.ipsw
iOS 9.2.1 (iPad 2 GSM): iPad2,2_9.2.1_13D15_Restore.ipsw
iOS 9.2.1 (iPad 2 CDMA): iPad2,3_9.2.1_13D15_Restore.ipsw
iOS 9.2.1 (iPad 2 New): iPad2,4_9.2.1_13D15_Restore.ipsw
iOS 9.2.1 (iPad 3 Wi-Fi): iPad3,1_9.2.1_13D15_Restore.ipsw
iOS 9.2.1 (iPad 3 CDMA): iPad3,2_9.2.1_13D15_Restore.ipsw
iOS 9.2.1 (iPad 3 GSM): iPad3,3_9.2.1_13D15_Restore.ipsw
iOS 9.2.1 (iPad Mini Wi-Fi): iPad2,5_9.2.1_13D15_Restore.ipsw
iOS 9.2.1 (iPad Mini GSM): iPad2,6_9.2.1_13D15_Restore.ipsw
iOS 9.2.1 (iPad Mini CDMA): iPad2,7_9.2.1_13D15_Restore.ipsw
iOS 9.2.1 (iPad 4 Wi-Fi): iPad3,4_9.2.1_13D15_Restore.ipsw
iOS 9.2.1 (iPad 4 GSM): iPad3,5_9.2.1_13D15_Restore.ipsw
iOS 9.2.1 (iPad 4 GSM_CDMA): iPad3,6_9.2.1_13D15_Restore.ipsw
iOS 9.2.1 (iPad Air Wi-Fi): iPad4,1_9.2.1_13D15_Restore.ipsw
iOS 9.2.1 (iPad Air Cellular): iPad4,2_9.2.1_13D15_Restore.ipsw
iOS 9.2.1 (iPad Mini 2 Wi-Fi): iPad4,4_9.2.1_13D15_Restore.ipsw
iOS 9.2.1 (iPad Mini 2 Cellular): iPad4,5_9.2.1_13D15_Restore.ipsw
iOS 9.2.1 (iPad Air China): iPad4,3_9.2.1_13D15_Restore.ipsw
iOS 9.2.1 (iPad Mini 2 China): iPad4,6_9.2.1_13D15_Restore.ipsw
iOS 9.2.1 (iPad Mini 3 Wi-Fi): iPad4,7_9.2.1_13D15_Restore.ipsw
iOS 9.2.1 (iPad Mini 3 Cellular): iPad4,8_9.2.1_13D15_Restore.ipsw
iOS 9.2.1 (iPad Mini 3 China): iPad4,9_9.2.1_13D15_Restore.ipsw
iOS 9.2.1 (iPad Air 2 Wi-Fi): iPad5,3_9.2.1_13D15_Restore.ipsw
iOS 9.2.1 (iPad Air 2 Cellular): iPad5,4_9.2.1_13D15_Restore.ipsw
iOS 9.2.1 (iPad Mini 4 Wi-Fi): iPad5,1_9.2.1_13D15_Restore.ipsw
iOS 9.2.1 (iPad Mini 4 Cellular): iPad5,2_9.2.1_13D15_Restore.ipsw
iOS 9.2.1 (iPad Pro Wi-Fi): iPad6,7_9.2.1_13D15_Restore.ipsw
iOS 9.2.1 (iPad Pro Cellular): iPad6,8_9.2.1_13D15_Restore.ipsw

iOS 9.2.1 download links for iPod touch

iOS 9.2.1 (iPod touch 5G): iPod5,1_9.2.1_13D15_Restore.ipsw
iOS 9.2.1 (iPod touch 6G): iPod7,1_9.2.1_13D15_Restore.ipsw

Update 2:

According to the security release notes, here’s the complete list of security vulnerabilities that were patched in iOS 9.2.1:

  • Disk ImagesAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: A local user may be able to execute arbitrary code with kernel privileges

    Description: A memory corruption issue existed in the parsing of disk images. This issue was addressed through improved memory handling.

    CVE-ID

    CVE-2016-1717 : Frank Graziano of Yahoo! Pentest Team

  • IOHIDFamilyAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: A local user may be able to execute arbitrary code with kernel privileges

    Description: A memory corruption issue existed in an IOHIDFamily API. This issue was addressed through improved memory handling.

    CVE-ID

    CVE-2016-1719 : Ian Beer of Google Project Zero

  • IOKitAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: A local user may be able to execute arbitrary code with kernel privileges

    Description: A memory corruption issue was addressed through improved memory handling.

    CVE-ID

    CVE-2016-1720 : Ian Beer of Google Project Zero

  • KernelAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: A local user may be able to execute arbitrary code with kernel privileges

    Description: A memory corruption issue was addressed through improved memory handling.

    CVE-ID

    CVE-2016-1721 : Ian Beer of Google Project Zero and Ju Zhu of Trend Micro

  • libxsltAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: Visiting a maliciously crafted website may lead to arbitrary code execution

    Description: A type confusion issue existed in libxslt. This issue was addressed through improved memory handling.

    CVE-ID

    CVE-2015-7995 : puzzor

  • syslogAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: A local user may be able to execute arbitrary code with root privileges

    Description: A memory corruption issue was addressed through improved memory handling.

    CVE-ID

    CVE-2016-1722 : Joshua J. Drake and Nikias Bassen of Zimperium zLabs

  • WebKitAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: Visiting a maliciously crafted website may lead to arbitrary code execution

    Description: Multiple memory corruption issues existed in WebKit. These issues were addressed through improved memory handling.

    CVE-ID

    CVE-2016-1723 : Apple

    CVE-2016-1724 : Apple

    CVE-2016-1725 : Apple

    CVE-2016-1726 : Apple

    CVE-2016-1727 : Apple

  • WebKit CSSAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: Websites may know if the user has visited a given link

    Description: A privacy issue existed in the handling of the “a:visited button” CSS selector when evaluating the containing element’s height. This was addressed through improved validation.

    CVE-ID

    CVE-2016-1728 : an anonymous researcher coordinated via Joe Vennix

  • WebSheetAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: A malicious captive portal may be able to access the user’s cookies

    Description: An issue existed that allowed some captive portals to read or write cookies. The issue was addressed through an isolated cookie store for all captive portals.

    CVE-ID

    CVE-2016-1730 : Adi Sharabani and Yair Amit of Skycure