Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-40426 (GCVE-0-2023-40426)
Vulnerability from cvelistv5 – Published: 2023-09-26 20:14 – Updated: 2025-11-04 19:19- An app may be able to bypass certain Privacy preferences
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T19:19:06.597Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://support.apple.com/en-us/HT213940"
},
{
"tags": [
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2023/Oct/3"
},
{
"url": "https://support.apple.com/kb/HT213940"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-40426",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-24T14:30:41.490075Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-09-24T14:30:48.895Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "macOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "14",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14. An app may be able to bypass certain Privacy preferences."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "An app may be able to bypass certain Privacy preferences",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-10-03T05:11:59.724Z",
"orgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"shortName": "apple"
},
"references": [
{
"url": "https://support.apple.com/en-us/HT213940"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Oct/3"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"assignerShortName": "apple",
"cveId": "CVE-2023-40426",
"datePublished": "2023-09-26T20:14:42.062Z",
"dateReserved": "2023-08-14T20:26:36.259Z",
"dateUpdated": "2025-11-04T19:19:06.597Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"14.0\", \"matchCriteriaId\": \"7A5DD3D5-FB4F-4313-B873-DCED87FC4605\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14. An app may be able to bypass certain Privacy preferences.\"}, {\"lang\": \"es\", \"value\": \"Se solucion\\u00f3 un problema de permisos con restricciones adicionales. Este problema se solucion\\u00f3 en macOS Sonoma 14. Es posible que una aplicaci\\u00f3n pueda omitir ciertas configuraciones de Privacidad.\"}]",
"id": "CVE-2023-40426",
"lastModified": "2024-11-21T08:19:26.150",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\", \"baseScore\": 5.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 3.6}]}",
"published": "2023-09-27T15:19:11.620",
"references": "[{\"url\": \"http://seclists.org/fulldisclosure/2023/Oct/3\", \"source\": \"product-security@apple.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://support.apple.com/en-us/HT213940\", \"source\": \"product-security@apple.com\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2023/Oct/3\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://support.apple.com/en-us/HT213940\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}]",
"sourceIdentifier": "product-security@apple.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2023-40426\",\"sourceIdentifier\":\"product-security@apple.com\",\"published\":\"2023-09-27T15:19:11.620\",\"lastModified\":\"2025-11-04T20:16:39.900\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14. An app may be able to bypass certain Privacy preferences.\"},{\"lang\":\"es\",\"value\":\"Se solucion\u00f3 un problema de permisos con restricciones adicionales. Este problema se solucion\u00f3 en macOS Sonoma 14. Es posible que una aplicaci\u00f3n pueda omitir ciertas configuraciones de Privacidad.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"14.0\",\"matchCriteriaId\":\"7A5DD3D5-FB4F-4313-B873-DCED87FC4605\"}]}]}],\"references\":[{\"url\":\"http://seclists.org/fulldisclosure/2023/Oct/3\",\"source\":\"product-security@apple.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213940\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2023/Oct/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213940\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT213940\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://support.apple.com/en-us/HT213940\", \"tags\": [\"x_transferred\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2023/Oct/3\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T18:31:53.812Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-40426\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-24T14:30:41.490075Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-24T14:30:44.965Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"Apple\", \"product\": \"macOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"14\", \"versionType\": \"custom\"}]}], \"references\": [{\"url\": \"https://support.apple.com/en-us/HT213940\"}, {\"url\": \"http://seclists.org/fulldisclosure/2023/Oct/3\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14. An app may be able to bypass certain Privacy preferences.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"An app may be able to bypass certain Privacy preferences\"}]}], \"providerMetadata\": {\"orgId\": \"286789f9-fbc2-4510-9f9a-43facdede74c\", \"shortName\": \"apple\", \"dateUpdated\": \"2023-10-03T05:11:59.724Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-40426\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-02-13T17:08:08.773Z\", \"dateReserved\": \"2023-08-14T20:26:36.259Z\", \"assignerOrgId\": \"286789f9-fbc2-4510-9f9a-43facdede74c\", \"datePublished\": \"2023-09-26T20:14:42.062Z\", \"assignerShortName\": \"apple\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CERTFR-2023-AVI-0784
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et une exécution de code arbitraire à distance.
Apple indique que la vulnérabilité CVE-2023-41993 est activement exploitée dans le cadre d 'attaques ciblées sur des versions d'iOS antérieures à 16.7.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | N/A | watchOS versions antérieures à 10 | ||
| Apple | N/A | tvOS versions antérieures à 17 | ||
| Apple | N/A | iOS et iPadOS versions antérieures à 16.7 ou 17 | ||
| Apple | N/A | Xcode versions antérieures à 15 | ||
| Apple | macOS | macOS Sonoma versions antérieures à 14 | ||
| Apple | Safari | Safari versions antérieures à 17 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "watchOS versions ant\u00e9rieures \u00e0 10",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "tvOS versions ant\u00e9rieures \u00e0 17",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS et iPadOS versions ant\u00e9rieures \u00e0 16.7 ou 17",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Xcode versions ant\u00e9rieures \u00e0 15",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Sonoma versions ant\u00e9rieures \u00e0 14",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Safari versions ant\u00e9rieures \u00e0 17",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-40454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40454"
},
{
"name": "CVE-2023-38596",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38596"
},
{
"name": "CVE-2023-23495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23495"
},
{
"name": "CVE-2023-40434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40434"
},
{
"name": "CVE-2023-40384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40384"
},
{
"name": "CVE-2023-40429",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40429"
},
{
"name": "CVE-2023-40432",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40432"
},
{
"name": "CVE-2023-35074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35074"
},
{
"name": "CVE-2023-41078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41078"
},
{
"name": "CVE-2023-40406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40406"
},
{
"name": "CVE-2023-39233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39233"
},
{
"name": "CVE-2023-40448",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40448"
},
{
"name": "CVE-2023-29497",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29497"
},
{
"name": "CVE-2023-41980",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41980"
},
{
"name": "CVE-2023-41068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41068"
},
{
"name": "CVE-2023-40435",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40435"
},
{
"name": "CVE-2023-40427",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40427"
},
{
"name": "CVE-2023-40391",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40391"
},
{
"name": "CVE-2023-40451",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40451"
},
{
"name": "CVE-2023-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38615"
},
{
"name": "CVE-2023-40400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40400"
},
{
"name": "CVE-2023-40395",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40395"
},
{
"name": "CVE-2023-40452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40452"
},
{
"name": "CVE-2023-40431",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40431"
},
{
"name": "CVE-2023-40418",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40418"
},
{
"name": "CVE-2023-41071",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41071"
},
{
"name": "CVE-2023-40443",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40443"
},
{
"name": "CVE-2023-41079",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41079"
},
{
"name": "CVE-2023-40455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40455"
},
{
"name": "CVE-2023-41981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41981"
},
{
"name": "CVE-2023-41066",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41066"
},
{
"name": "CVE-2023-40456",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40456"
},
{
"name": "CVE-2023-40402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40402"
},
{
"name": "CVE-2023-32361",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32361"
},
{
"name": "CVE-2023-41073",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41073"
},
{
"name": "CVE-2023-40422",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40422"
},
{
"name": "CVE-2023-35984",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35984"
},
{
"name": "CVE-2023-37448",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37448"
},
{
"name": "CVE-2023-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41232"
},
{
"name": "CVE-2023-41993",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41993"
},
{
"name": "CVE-2023-41067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41067"
},
{
"name": "CVE-2023-40399",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40399"
},
{
"name": "CVE-2023-35990",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35990"
},
{
"name": "CVE-2023-40407",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40407"
},
{
"name": "CVE-2023-40410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40410"
},
{
"name": "CVE-2023-32377",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32377"
},
{
"name": "CVE-2023-40541",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40541"
},
{
"name": "CVE-2023-40386",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40386"
},
{
"name": "CVE-2023-32396",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32396"
},
{
"name": "CVE-2023-39434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39434"
},
{
"name": "CVE-2023-32421",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32421"
},
{
"name": "CVE-2023-41968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41968"
},
{
"name": "CVE-2023-40419",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40419"
},
{
"name": "CVE-2023-41063",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41063"
},
{
"name": "CVE-2023-40409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40409"
},
{
"name": "CVE-2023-40424",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40424"
},
{
"name": "CVE-2023-41984",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41984"
},
{
"name": "CVE-2023-40426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40426"
},
{
"name": "CVE-2023-40412",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40412"
},
{
"name": "CVE-2023-40520",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40520"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2023-40428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40428"
},
{
"name": "CVE-2023-40450",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40450"
},
{
"name": "CVE-2023-41986",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41986"
},
{
"name": "CVE-2023-40417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40417"
},
{
"name": "CVE-2023-40441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40441"
},
{
"name": "CVE-2023-38586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38586"
},
{
"name": "CVE-2023-40388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40388"
},
{
"name": "CVE-2023-40436",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40436"
},
{
"name": "CVE-2023-41065",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41065"
},
{
"name": "CVE-2023-40420",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40420"
},
{
"name": "CVE-2023-41070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41070"
},
{
"name": "CVE-2023-41979",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41979"
},
{
"name": "CVE-2023-41174",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41174"
},
{
"name": "CVE-2023-41074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41074"
},
{
"name": "CVE-2023-41995",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41995"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0784",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-09-27T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Apple\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une ex\u00e9cution de code\narbitraire \u00e0 distance.\n\nApple indique que la vuln\u00e9rabilit\u00e9 CVE-2023-41993 est activement\nexploit\u00e9e dans le cadre d \u0027attaques cibl\u00e9es sur des versions d\u0027iOS\nant\u00e9rieures \u00e0 16.7.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213936 du 18 septembre 2023",
"url": "https://support.apple.com/en-us/HT213936"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213939 du 18 septembre 2023",
"url": "https://support.apple.com/en-us/HT213939"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213941 du 26 septembre 2023",
"url": "https://support.apple.com/en-us/HT213941"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213940 du 26 septembre 2023",
"url": "https://support.apple.com/en-us/HT213940"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213937 du 18 septembre 2023",
"url": "https://support.apple.com/en-us/HT213937"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213938 du 18 septembre 2023",
"url": "https://support.apple.com/en-us/HT213938"
}
]
}
CERTFR-2023-AVI-0784
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et une exécution de code arbitraire à distance.
Apple indique que la vulnérabilité CVE-2023-41993 est activement exploitée dans le cadre d 'attaques ciblées sur des versions d'iOS antérieures à 16.7.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | N/A | watchOS versions antérieures à 10 | ||
| Apple | N/A | tvOS versions antérieures à 17 | ||
| Apple | N/A | iOS et iPadOS versions antérieures à 16.7 ou 17 | ||
| Apple | N/A | Xcode versions antérieures à 15 | ||
| Apple | macOS | macOS Sonoma versions antérieures à 14 | ||
| Apple | Safari | Safari versions antérieures à 17 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "watchOS versions ant\u00e9rieures \u00e0 10",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "tvOS versions ant\u00e9rieures \u00e0 17",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS et iPadOS versions ant\u00e9rieures \u00e0 16.7 ou 17",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Xcode versions ant\u00e9rieures \u00e0 15",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Sonoma versions ant\u00e9rieures \u00e0 14",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Safari versions ant\u00e9rieures \u00e0 17",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-40454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40454"
},
{
"name": "CVE-2023-38596",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38596"
},
{
"name": "CVE-2023-23495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23495"
},
{
"name": "CVE-2023-40434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40434"
},
{
"name": "CVE-2023-40384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40384"
},
{
"name": "CVE-2023-40429",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40429"
},
{
"name": "CVE-2023-40432",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40432"
},
{
"name": "CVE-2023-35074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35074"
},
{
"name": "CVE-2023-41078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41078"
},
{
"name": "CVE-2023-40406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40406"
},
{
"name": "CVE-2023-39233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39233"
},
{
"name": "CVE-2023-40448",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40448"
},
{
"name": "CVE-2023-29497",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29497"
},
{
"name": "CVE-2023-41980",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41980"
},
{
"name": "CVE-2023-41068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41068"
},
{
"name": "CVE-2023-40435",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40435"
},
{
"name": "CVE-2023-40427",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40427"
},
{
"name": "CVE-2023-40391",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40391"
},
{
"name": "CVE-2023-40451",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40451"
},
{
"name": "CVE-2023-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38615"
},
{
"name": "CVE-2023-40400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40400"
},
{
"name": "CVE-2023-40395",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40395"
},
{
"name": "CVE-2023-40452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40452"
},
{
"name": "CVE-2023-40431",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40431"
},
{
"name": "CVE-2023-40418",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40418"
},
{
"name": "CVE-2023-41071",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41071"
},
{
"name": "CVE-2023-40443",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40443"
},
{
"name": "CVE-2023-41079",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41079"
},
{
"name": "CVE-2023-40455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40455"
},
{
"name": "CVE-2023-41981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41981"
},
{
"name": "CVE-2023-41066",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41066"
},
{
"name": "CVE-2023-40456",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40456"
},
{
"name": "CVE-2023-40402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40402"
},
{
"name": "CVE-2023-32361",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32361"
},
{
"name": "CVE-2023-41073",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41073"
},
{
"name": "CVE-2023-40422",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40422"
},
{
"name": "CVE-2023-35984",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35984"
},
{
"name": "CVE-2023-37448",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37448"
},
{
"name": "CVE-2023-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41232"
},
{
"name": "CVE-2023-41993",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41993"
},
{
"name": "CVE-2023-41067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41067"
},
{
"name": "CVE-2023-40399",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40399"
},
{
"name": "CVE-2023-35990",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35990"
},
{
"name": "CVE-2023-40407",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40407"
},
{
"name": "CVE-2023-40410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40410"
},
{
"name": "CVE-2023-32377",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32377"
},
{
"name": "CVE-2023-40541",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40541"
},
{
"name": "CVE-2023-40386",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40386"
},
{
"name": "CVE-2023-32396",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32396"
},
{
"name": "CVE-2023-39434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39434"
},
{
"name": "CVE-2023-32421",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32421"
},
{
"name": "CVE-2023-41968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41968"
},
{
"name": "CVE-2023-40419",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40419"
},
{
"name": "CVE-2023-41063",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41063"
},
{
"name": "CVE-2023-40409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40409"
},
{
"name": "CVE-2023-40424",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40424"
},
{
"name": "CVE-2023-41984",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41984"
},
{
"name": "CVE-2023-40426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40426"
},
{
"name": "CVE-2023-40412",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40412"
},
{
"name": "CVE-2023-40520",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40520"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2023-40428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40428"
},
{
"name": "CVE-2023-40450",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40450"
},
{
"name": "CVE-2023-41986",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41986"
},
{
"name": "CVE-2023-40417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40417"
},
{
"name": "CVE-2023-40441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40441"
},
{
"name": "CVE-2023-38586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38586"
},
{
"name": "CVE-2023-40388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40388"
},
{
"name": "CVE-2023-40436",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40436"
},
{
"name": "CVE-2023-41065",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41065"
},
{
"name": "CVE-2023-40420",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40420"
},
{
"name": "CVE-2023-41070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41070"
},
{
"name": "CVE-2023-41979",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41979"
},
{
"name": "CVE-2023-41174",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41174"
},
{
"name": "CVE-2023-41074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41074"
},
{
"name": "CVE-2023-41995",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41995"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0784",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-09-27T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Apple\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une ex\u00e9cution de code\narbitraire \u00e0 distance.\n\nApple indique que la vuln\u00e9rabilit\u00e9 CVE-2023-41993 est activement\nexploit\u00e9e dans le cadre d \u0027attaques cibl\u00e9es sur des versions d\u0027iOS\nant\u00e9rieures \u00e0 16.7.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213936 du 18 septembre 2023",
"url": "https://support.apple.com/en-us/HT213936"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213939 du 18 septembre 2023",
"url": "https://support.apple.com/en-us/HT213939"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213941 du 26 septembre 2023",
"url": "https://support.apple.com/en-us/HT213941"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213940 du 26 septembre 2023",
"url": "https://support.apple.com/en-us/HT213940"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213937 du 18 septembre 2023",
"url": "https://support.apple.com/en-us/HT213937"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213938 du 18 septembre 2023",
"url": "https://support.apple.com/en-us/HT213938"
}
]
}
GHSA-862F-6Q7F-WPQ5
Vulnerability from github – Published: 2023-09-27 15:30 – Updated: 2025-11-04 21:30A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14. An app may be able to bypass certain Privacy preferences.
{
"affected": [],
"aliases": [
"CVE-2023-40426"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2023-09-27T15:19:11Z",
"severity": "MODERATE"
},
"details": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14. An app may be able to bypass certain Privacy preferences.",
"id": "GHSA-862f-6q7f-wpq5",
"modified": "2025-11-04T21:30:41Z",
"published": "2023-09-27T15:30:36Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40426"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/HT213940"
},
{
"type": "WEB",
"url": "https://support.apple.com/kb/HT213940"
},
{
"type": "WEB",
"url": "http://seclists.org/fulldisclosure/2023/Oct/3"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"type": "CVSS_V3"
}
]
}
FKIE_CVE-2023-40426
Vulnerability from fkie_nvd - Published: 2023-09-27 15:19 - Updated: 2025-11-04 20:16| URL | Tags | ||
|---|---|---|---|
| product-security@apple.com | http://seclists.org/fulldisclosure/2023/Oct/3 | Mailing List, Third Party Advisory | |
| product-security@apple.com | https://support.apple.com/en-us/HT213940 | Release Notes, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2023/Oct/3 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/en-us/HT213940 | Release Notes, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT213940 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7A5DD3D5-FB4F-4313-B873-DCED87FC4605",
"versionEndExcluding": "14.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14. An app may be able to bypass certain Privacy preferences."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de permisos con restricciones adicionales. Este problema se solucion\u00f3 en macOS Sonoma 14. Es posible que una aplicaci\u00f3n pueda omitir ciertas configuraciones de Privacidad."
}
],
"id": "CVE-2023-40426",
"lastModified": "2025-11-04T20:16:39.900",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-09-27T15:19:11.620",
"references": [
{
"source": "product-security@apple.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2023/Oct/3"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213940"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2023/Oct/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213940"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://support.apple.com/kb/HT213940"
}
],
"sourceIdentifier": "product-security@apple.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2023-40426
Vulnerability from gsd - Updated: 2023-12-13 01:20{
"GSD": {
"alias": "CVE-2023-40426",
"id": "GSD-2023-40426"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2023-40426"
],
"details": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14. An app may be able to bypass certain Privacy preferences.",
"id": "GSD-2023-40426",
"modified": "2023-12-13T01:20:44.056445Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2023-40426",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "macOS",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "unspecified",
"version_value": "14"
}
]
}
}
]
},
"vendor_name": "Apple"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14. An app may be able to bypass certain Privacy preferences."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "An app may be able to bypass certain Privacy preferences"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.apple.com/en-us/HT213940",
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT213940"
},
{
"name": "http://seclists.org/fulldisclosure/2023/Oct/3",
"refsource": "MISC",
"url": "http://seclists.org/fulldisclosure/2023/Oct/3"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "14.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2023-40426"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14. An app may be able to bypass certain Privacy preferences."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.apple.com/en-us/HT213940",
"refsource": "MISC",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213940"
},
{
"name": "http://seclists.org/fulldisclosure/2023/Oct/3",
"refsource": "MISC",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2023/Oct/3"
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
},
"lastModifiedDate": "2023-10-12T02:18Z",
"publishedDate": "2023-09-27T15:19Z"
}
}
}
WID-SEC-W-2023-2453
Vulnerability from csaf_certbund - Published: 2023-09-26 22:00 - Updated: 2025-04-13 22:00{
"document": {
"aggregate_severity": {
"text": "kritisch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter oder lokaler Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Rechte zu erweitern oder Daten zu manipulieren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- MacOS X",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-2453 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2453.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-2453 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2453"
},
{
"category": "external",
"summary": "Apple Security Advisory vom 2023-09-26",
"url": "https://support.apple.com/en-us/HT213931"
},
{
"category": "external",
"summary": "Apple Security Advisory vom 2023-09-26",
"url": "https://support.apple.com/en-us/HT213932"
},
{
"category": "external",
"summary": "Apple Security Advisory vom 2023-09-26",
"url": "https://support.apple.com/en-us/HT213940"
}
],
"source_lang": "en-US",
"title": "Apple macOS: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-04-13T22:00:00.000+00:00",
"generator": {
"date": "2025-04-14T08:21:12.074+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2023-2453",
"initial_release_date": "2023-09-26T22:00:00.000+00:00",
"revision_history": [
{
"date": "2023-09-26T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-10-25T22:00:00.000+00:00",
"number": "2",
"summary": "CVE erg\u00e4nzt"
},
{
"date": "2024-01-22T23:00:00.000+00:00",
"number": "3",
"summary": "CVE\u0027s erg\u00e4nzt"
},
{
"date": "2025-04-13T22:00:00.000+00:00",
"number": "4",
"summary": "CVE-Nummern erg\u00e4nzt"
}
],
"status": "final",
"version": "4"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Ventura \u003c13.6",
"product": {
"name": "Apple macOS Ventura \u003c13.6",
"product_id": "T030093"
}
},
{
"category": "product_version",
"name": "Ventura 13.6",
"product": {
"name": "Apple macOS Ventura 13.6",
"product_id": "T030093-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:ventura__13.6"
}
}
},
{
"category": "product_version_range",
"name": "Monterey \u003c12.7",
"product": {
"name": "Apple macOS Monterey \u003c12.7",
"product_id": "T030094"
}
},
{
"category": "product_version",
"name": "Monterey 12.7",
"product": {
"name": "Apple macOS Monterey 12.7",
"product_id": "T030094-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:monterey__12.7"
}
}
},
{
"category": "product_version_range",
"name": "Sonoma \u003c14",
"product": {
"name": "Apple macOS Sonoma \u003c14",
"product_id": "T030095"
}
},
{
"category": "product_version",
"name": "Sonoma 14",
"product": {
"name": "Apple macOS Sonoma 14",
"product_id": "T030095-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:sonoma__14"
}
}
}
],
"category": "product_name",
"name": "macOS"
}
],
"category": "vendor",
"name": "Apple"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-23495",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-23495"
},
{
"cve": "CVE-2023-29497",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-29497"
},
{
"cve": "CVE-2023-32361",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-32361"
},
{
"cve": "CVE-2023-32377",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-32377"
},
{
"cve": "CVE-2023-32396",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-32396"
},
{
"cve": "CVE-2023-32421",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-32421"
},
{
"cve": "CVE-2023-35074",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-35074"
},
{
"cve": "CVE-2023-35984",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-35984"
},
{
"cve": "CVE-2023-35990",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-35990"
},
{
"cve": "CVE-2023-37448",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-37448"
},
{
"cve": "CVE-2023-38586",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-38586"
},
{
"cve": "CVE-2023-38596",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-38596"
},
{
"cve": "CVE-2023-3860",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-3860"
},
{
"cve": "CVE-2023-38607",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-38607"
},
{
"cve": "CVE-2023-38615",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-38615"
},
{
"cve": "CVE-2023-39233",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-39233"
},
{
"cve": "CVE-2023-39434",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-39434"
},
{
"cve": "CVE-2023-40384",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40384"
},
{
"cve": "CVE-2023-40386",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40386"
},
{
"cve": "CVE-2023-40388",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40388"
},
{
"cve": "CVE-2023-40391",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40391"
},
{
"cve": "CVE-2023-40393",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40393"
},
{
"cve": "CVE-2023-40395",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40395"
},
{
"cve": "CVE-2023-40396",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40396"
},
{
"cve": "CVE-2023-40399",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40399"
},
{
"cve": "CVE-2023-40400",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40400"
},
{
"cve": "CVE-2023-40402",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40402"
},
{
"cve": "CVE-2023-40403",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40403"
},
{
"cve": "CVE-2023-40406",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40406"
},
{
"cve": "CVE-2023-40407",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40407"
},
{
"cve": "CVE-2023-40409",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40409"
},
{
"cve": "CVE-2023-40410",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40410"
},
{
"cve": "CVE-2023-40411",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40411"
},
{
"cve": "CVE-2023-40412",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40412"
},
{
"cve": "CVE-2023-40417",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40417"
},
{
"cve": "CVE-2023-40420",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40420"
},
{
"cve": "CVE-2023-40422",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40422"
},
{
"cve": "CVE-2023-40424",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40424"
},
{
"cve": "CVE-2023-40426",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40426"
},
{
"cve": "CVE-2023-40427",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40427"
},
{
"cve": "CVE-2023-40429",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40429"
},
{
"cve": "CVE-2023-40430",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40430"
},
{
"cve": "CVE-2023-40432",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40432"
},
{
"cve": "CVE-2023-40434",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40434"
},
{
"cve": "CVE-2023-40436",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40436"
},
{
"cve": "CVE-2023-40438",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40438"
},
{
"cve": "CVE-2023-40441",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40441"
},
{
"cve": "CVE-2023-40448",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40448"
},
{
"cve": "CVE-2023-40450",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40450"
},
{
"cve": "CVE-2023-40452",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40452"
},
{
"cve": "CVE-2023-40454",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40454"
},
{
"cve": "CVE-2023-40455",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40455"
},
{
"cve": "CVE-2023-40541",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40541"
},
{
"cve": "CVE-2023-41063",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41063"
},
{
"cve": "CVE-2023-41065",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41065"
},
{
"cve": "CVE-2023-41066",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41066"
},
{
"cve": "CVE-2023-41067",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41067"
},
{
"cve": "CVE-2023-41070",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41070"
},
{
"cve": "CVE-2023-41071",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41071"
},
{
"cve": "CVE-2023-41073",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41073"
},
{
"cve": "CVE-2023-41074",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41074"
},
{
"cve": "CVE-2023-41076",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41076"
},
{
"cve": "CVE-2023-41078",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41078"
},
{
"cve": "CVE-2023-41079",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41079"
},
{
"cve": "CVE-2023-41232",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41232"
},
{
"cve": "CVE-2023-41968",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41968"
},
{
"cve": "CVE-2023-41979",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41979"
},
{
"cve": "CVE-2023-41980",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41980"
},
{
"cve": "CVE-2023-41981",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41981"
},
{
"cve": "CVE-2023-41984",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41984"
},
{
"cve": "CVE-2023-41986",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41986"
},
{
"cve": "CVE-2023-41987",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41987"
},
{
"cve": "CVE-2023-41991",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41991"
},
{
"cve": "CVE-2023-41992",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41992"
},
{
"cve": "CVE-2023-41993",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41993"
},
{
"cve": "CVE-2023-41994",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41994"
},
{
"cve": "CVE-2023-41995",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41995"
},
{
"cve": "CVE-2023-41996",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41996"
},
{
"cve": "CVE-2023-42826",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42826"
},
{
"cve": "CVE-2023-42876",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42876"
},
{
"cve": "CVE-2023-42918",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42918"
},
{
"cve": "CVE-2023-42929",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42929"
},
{
"cve": "CVE-2023-42933",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42933"
},
{
"cve": "CVE-2023-42934",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42934"
},
{
"cve": "CVE-2023-42943",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42943"
},
{
"cve": "CVE-2023-42948",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42948"
},
{
"cve": "CVE-2023-42949",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42949"
},
{
"cve": "CVE-2023-42957",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42957"
},
{
"cve": "CVE-2023-42959",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42959"
},
{
"cve": "CVE-2023-42961",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42961"
},
{
"cve": "CVE-2023-42969",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42969"
},
{
"cve": "CVE-2023-42970",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42970"
},
{
"cve": "CVE-2023-42977",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42977"
},
{
"cve": "CVE-2023-42981",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42981"
},
{
"cve": "CVE-2023-42982",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42982"
},
{
"cve": "CVE-2023-42983",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42983"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.