Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-41974 (GCVE-0-2023-41974)
Vulnerability from cvelistv5 – Published: 2024-01-10 22:03 – Updated: 2026-03-12 00:52- An app may be able to execute arbitrary code with kernel privileges
| Vendor | Product | Version | |
|---|---|---|---|
| Apple | iOS and iPadOS |
Affected:
unspecified , < 17
(custom)
|
|
| Apple | iOS and iPadOS |
Affected:
unspecified , < 15.8.7
(custom)
|
CISA KEV
Known Exploited Vulnerability - GCVE BCP-07 Compliant
Exploited: Yes
Timestamps
Scope
Evidence
Type: Vendor Report
Signal: Successful Exploitation
Confidence: 80%
Source: cisa-kev
Details
| Cwes | CWE-416 |
|---|---|
| Feed | CISA Known Exploited Vulnerabilities Catalog |
| Product | iOS and iPadOS |
| Due Date | 2026-03-26 |
| Date Added | 2026-03-05 |
| Vendorproject | Apple |
| Vulnerabilityname | Apple iOS and iPadOS Use-After-Free Vulnerability |
| Knownransomwarecampaignuse | Unknown |
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T19:21:17.242Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://support.apple.com/en-us/HT213938"
},
{
"url": "https://support.apple.com/kb/HT213938"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2023-41974",
"options": [
{
"Exploitation": "active"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-01-22T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
},
{
"other": {
"content": {
"dateAdded": "2026-03-05",
"reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-41974"
},
"type": "kev"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-416",
"description": "CWE-416 Use After Free",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-03-06T04:55:47.180Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"third-party-advisory"
],
"url": "https://cloud.google.com/blog/topics/threat-intelligence/coruna-powerful-ios-exploit-kit"
},
{
"tags": [
"government-resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-41974"
}
],
"timeline": [
{
"lang": "en",
"time": "2026-03-05T00:00:00.000Z",
"value": "CVE-2023-41974 added to CISA KEV"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "iOS and iPadOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "17",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "iOS and iPadOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "15.8.7",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 17 and iPadOS 17, iOS 15.8.7 and iPadOS 15.8.7. An app may be able to execute arbitrary code with kernel privileges."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "An app may be able to execute arbitrary code with kernel privileges",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-03-12T00:52:05.981Z",
"orgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"shortName": "apple"
},
"references": [
{
"url": "https://support.apple.com/en-us/120949"
},
{
"url": "https://support.apple.com/en-us/126632"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"assignerShortName": "apple",
"cveId": "CVE-2023-41974",
"datePublished": "2024-01-10T22:03:23.430Z",
"dateReserved": "2023-09-06T17:40:06.138Z",
"dateUpdated": "2026-03-12T00:52:05.981Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"cisa_known_exploited": {
"cveID": "CVE-2023-41974",
"cwes": "[\"CWE-416\"]",
"dateAdded": "2026-03-05",
"dueDate": "2026-03-26",
"knownRansomwareCampaignUse": "Unknown",
"notes": "https://support.apple.com/en-us/HT213938 ; https://support.apple.com/kb/HT213938 ; https://nvd.nist.gov/vuln/detail/CVE-2023-41974",
"product": "iOS and iPadOS",
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
"shortDescription": "Apple iOS and iPadOS contain a use-after-free vulnerability. An app may be able to execute arbitrary code with kernel privileges.",
"vendorProject": "Apple",
"vulnerabilityName": "Apple iOS and iPadOS Use-After-Free Vulnerability"
},
"epss": {
"cve": "CVE-2023-41974",
"date": "2026-05-14",
"epss": "0.00217",
"percentile": "0.44128"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"17.0\", \"matchCriteriaId\": \"B511B802-B0A2-412D-ADA4-8B783BDF1880\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"17.0\", \"matchCriteriaId\": \"E22CC7F9-F302-40B1-9B02-00FBC9805199\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 17 and iPadOS 17. An app may be able to execute arbitrary code with kernel privileges.\"}, {\"lang\": \"es\", \"value\": \"Se solucion\\u00f3 un problema de use after free con una gesti\\u00f3n de memoria mejorada. Este problema se solucion\\u00f3 en iOS 17 y iPadOS 17. Es posible que una aplicaci\\u00f3n pueda ejecutar c\\u00f3digo arbitrario con privilegios del kernel.\"}]",
"id": "CVE-2023-41974",
"lastModified": "2024-11-21T08:22:01.633",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 5.9}]}",
"published": "2024-01-10T22:15:49.240",
"references": "[{\"url\": \"https://support.apple.com/en-us/HT213938\", \"source\": \"product-security@apple.com\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://support.apple.com/en-us/HT213938\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}]",
"sourceIdentifier": "product-security@apple.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-416\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2023-41974\",\"sourceIdentifier\":\"product-security@apple.com\",\"published\":\"2024-01-10T22:15:49.240\",\"lastModified\":\"2026-03-12T13:25:14.333\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 17 and iPadOS 17, iOS 15.8.7 and iPadOS 15.8.7. An app may be able to execute arbitrary code with kernel privileges.\"},{\"lang\":\"es\",\"value\":\"Se solucion\u00f3 un problema de use after free con una gesti\u00f3n de memoria mejorada. Este problema se solucion\u00f3 en iOS 17 y iPadOS 17. Es posible que una aplicaci\u00f3n pueda ejecutar c\u00f3digo arbitrario con privilegios del kernel.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"cisaExploitAdd\":\"2026-03-05\",\"cisaActionDue\":\"2026-03-26\",\"cisaRequiredAction\":\"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\",\"cisaVulnerabilityName\":\"Apple iOS and iPadOS Use-After-Free Vulnerability\",\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"15.8.7\",\"matchCriteriaId\":\"1E574928-4E49-45B0-AE6E-DF4D38897F67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.0\",\"versionEndExcluding\":\"17.0\",\"matchCriteriaId\":\"96A83F37-8992-449C-BD92-5BF28788CB6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"15.8.7\",\"matchCriteriaId\":\"D1E9DC1A-618A-4CAF-96C7-EC5BA2C1F617\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.0\",\"versionEndExcluding\":\"17.0\",\"matchCriteriaId\":\"95DD2B66-EF25-4E37-94CE-8324CF4A40AB\"}]}]}],\"references\":[{\"url\":\"https://support.apple.com/en-us/120949\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/126632\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213938\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT213938\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://cloud.google.com/blog/topics/threat-intelligence/coruna-powerful-ios-exploit-kit\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-41974\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"tags\":[\"US Government Resource\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://support.apple.com/en-us/HT213938\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://support.apple.com/kb/HT213938\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-11-04T19:21:17.242Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.8, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-41974\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"active\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-03-05T19:20:17.708614Z\"}}}, {\"other\": {\"type\": \"kev\", \"content\": {\"dateAdded\": \"2026-03-05\", \"reference\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-41974\"}}}], \"references\": [{\"url\": \"https://cloud.google.com/blog/topics/threat-intelligence/coruna-powerful-ios-exploit-kit\", \"tags\": [\"third-party-advisory\"]}, {\"url\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-41974\", \"tags\": [\"government-resource\"]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-416\", \"description\": \"CWE-416 Use After Free\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-06-20T15:43:45.468Z\"}, \"timeline\": [{\"lang\": \"en\", \"time\": \"2026-03-05T00:00:00.000Z\", \"value\": \"CVE-2023-41974 added to CISA KEV\"}]}], \"cna\": {\"affected\": [{\"vendor\": \"Apple\", \"product\": \"iOS and iPadOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"17\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"iOS and iPadOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"15.8.7\", \"versionType\": \"custom\"}]}], \"references\": [{\"url\": \"https://support.apple.com/en-us/120949\"}, {\"url\": \"https://support.apple.com/en-us/126632\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 17 and iPadOS 17, iOS 15.8.7 and iPadOS 15.8.7. An app may be able to execute arbitrary code with kernel privileges.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"An app may be able to execute arbitrary code with kernel privileges\"}]}], \"providerMetadata\": {\"orgId\": \"286789f9-fbc2-4510-9f9a-43facdede74c\", \"shortName\": \"apple\", \"dateUpdated\": \"2026-03-12T00:52:05.981Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-41974\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-03-12T00:52:05.981Z\", \"dateReserved\": \"2023-09-06T17:40:06.138Z\", \"assignerOrgId\": \"286789f9-fbc2-4510-9f9a-43facdede74c\", \"datePublished\": \"2024-01-10T22:03:23.430Z\", \"assignerShortName\": \"apple\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
FKIE_CVE-2023-41974
Vulnerability from fkie_nvd - Published: 2024-01-10 22:15 - Updated: 2026-03-12 13:257.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
| URL | Tags | ||
|---|---|---|---|
| product-security@apple.com | https://support.apple.com/en-us/120949 | Release Notes, Vendor Advisory | |
| product-security@apple.com | https://support.apple.com/en-us/126632 | Release Notes, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/en-us/HT213938 | Release Notes, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT213938 | Release Notes, Vendor Advisory | |
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | https://cloud.google.com/blog/topics/threat-intelligence/coruna-powerful-ios-exploit-kit | Exploit, Third Party Advisory | |
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-41974 | US Government Resource |
{
"cisaActionDue": "2026-03-26",
"cisaExploitAdd": "2026-03-05",
"cisaRequiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Apple iOS and iPadOS Use-After-Free Vulnerability",
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1E574928-4E49-45B0-AE6E-DF4D38897F67",
"versionEndExcluding": "15.8.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"matchCriteriaId": "96A83F37-8992-449C-BD92-5BF28788CB6E",
"versionEndExcluding": "17.0",
"versionStartIncluding": "16.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D1E9DC1A-618A-4CAF-96C7-EC5BA2C1F617",
"versionEndExcluding": "15.8.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"matchCriteriaId": "95DD2B66-EF25-4E37-94CE-8324CF4A40AB",
"versionEndExcluding": "17.0",
"versionStartIncluding": "16.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 17 and iPadOS 17, iOS 15.8.7 and iPadOS 15.8.7. An app may be able to execute arbitrary code with kernel privileges."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de use after free con una gesti\u00f3n de memoria mejorada. Este problema se solucion\u00f3 en iOS 17 y iPadOS 17. Es posible que una aplicaci\u00f3n pueda ejecutar c\u00f3digo arbitrario con privilegios del kernel."
}
],
"id": "CVE-2023-41974",
"lastModified": "2026-03-12T13:25:14.333",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-01-10T22:15:49.240",
"references": [
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/120949"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/126632"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213938"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/kb/HT213938"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://cloud.google.com/blog/topics/threat-intelligence/coruna-powerful-ios-exploit-kit"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"US Government Resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-41974"
}
],
"sourceIdentifier": "product-security@apple.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
CERTFR-2026-AVI-0280
Vulnerability from certfr_avis - Published: 2026-03-12 - Updated: 2026-03-12
De multiples vulnérabilités ont été découvertes dans les produits Apple. Elles permettent à un attaquant de provoquer une exécution de code arbitraire et un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "iPadOS versions ant\u00e9rieures \u00e0 15.8.7",
"product": {
"name": "iPadOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS versions ant\u00e9rieures \u00e0 15.8.7",
"product": {
"name": "iOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS versions ant\u00e9rieures \u00e0 16.7.15",
"product": {
"name": "iOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iPadOS versions ant\u00e9rieures \u00e0 16.7.15",
"product": {
"name": "iPadOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23222"
},
{
"name": "CVE-2023-43010",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43010"
},
{
"name": "CVE-2023-41974",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41974"
},
{
"name": "CVE-2023-43000",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43000"
}
],
"initial_release_date": "2026-03-12T00:00:00",
"last_revision_date": "2026-03-12T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0280",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-12T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Apple. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire et un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 126646",
"url": "https://support.apple.com/en-us/126646"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 126632",
"url": "https://support.apple.com/en-us/126632"
}
]
}
WID-SEC-W-2023-2454
Vulnerability from csaf_certbund - Published: 2023-09-26 22:00 - Updated: 2025-04-13 22:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7
Apple / iOS
|
<16.7 | ||
|
Apple iPadOS <17
Apple / iPadOS
|
<17 | ||
|
Apple iPadOS <16.7
Apple / iPadOS
|
<16.7 | ||
|
Apple iOS <17
Apple / iOS
|
<17 |
{
"document": {
"aggregate_severity": {
"text": "kritisch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Das Apple iOS (vormals iPhone OS) ist das Betriebssystem f\u00fcr das von Apple entwickelte Smartphone iPhone, iPad und iPod Touch.\r\nDas Apple iPadOS ist das Betriebssystem f\u00fcr das von Apple entwickelte iPad.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apple iOS und Apple iPadOS ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen preiszugeben, Dateien zu manipulieren oder seine Privilegien zu erweitern.",
"title": "Angriff"
},
{
"category": "general",
"text": "- iPhoneOS",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-2454 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2454.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-2454 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2454"
},
{
"category": "external",
"summary": "Apple Security Update vom 2023-09-26",
"url": "https://support.apple.com/en-us/HT213927"
},
{
"category": "external",
"summary": "Apple Security Update vom 2023-09-26",
"url": "https://support.apple.com/en-us/HT213938"
}
],
"source_lang": "en-US",
"title": "Apple iOS und iPadOS: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-04-13T22:00:00.000+00:00",
"generator": {
"date": "2025-04-14T08:21:12.759+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2023-2454",
"initial_release_date": "2023-09-26T22:00:00.000+00:00",
"revision_history": [
{
"date": "2023-09-26T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-09-28T22:00:00.000+00:00",
"number": "2",
"summary": "Korrektur"
},
{
"date": "2024-01-22T23:00:00.000+00:00",
"number": "3",
"summary": "CVE\u0027s erg\u00e4nzt"
},
{
"date": "2025-04-13T22:00:00.000+00:00",
"number": "4",
"summary": "CVE-Nummern erg\u00e4nzt"
}
],
"status": "final",
"version": "4"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c16.7",
"product": {
"name": "Apple iOS \u003c16.7",
"product_id": "T030084"
}
},
{
"category": "product_version",
"name": "16.7",
"product": {
"name": "Apple iOS 16.7",
"product_id": "T030084-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:iphone_os:16.7"
}
}
},
{
"category": "product_version_range",
"name": "\u003c17",
"product": {
"name": "Apple iOS \u003c17",
"product_id": "T030087"
}
},
{
"category": "product_version",
"name": "17",
"product": {
"name": "Apple iOS 17",
"product_id": "T030087-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:iphone_os:17"
}
}
}
],
"category": "product_name",
"name": "iOS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c16.7",
"product": {
"name": "Apple iPadOS \u003c16.7",
"product_id": "T030085"
}
},
{
"category": "product_version",
"name": "16.7",
"product": {
"name": "Apple iPadOS 16.7",
"product_id": "T030085-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:ipados:16.7"
}
}
},
{
"category": "product_version_range",
"name": "\u003c17",
"product": {
"name": "Apple iPadOS \u003c17",
"product_id": "T030086"
}
},
{
"category": "product_version",
"name": "17",
"product": {
"name": "Apple iPadOS 17",
"product_id": "T030086-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:ipados:17"
}
}
}
],
"category": "product_name",
"name": "iPadOS"
}
],
"category": "vendor",
"name": "Apple"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-32361",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-32361"
},
{
"cve": "CVE-2023-32396",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-32396"
},
{
"cve": "CVE-2023-35074",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-35074"
},
{
"cve": "CVE-2023-35984",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-35984"
},
{
"cve": "CVE-2023-35990",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-35990"
},
{
"cve": "CVE-2023-38596",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-38596"
},
{
"cve": "CVE-2023-38610",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-38610"
},
{
"cve": "CVE-2023-38612",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-38612"
},
{
"cve": "CVE-2023-38614",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-38614"
},
{
"cve": "CVE-2023-39434",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-39434"
},
{
"cve": "CVE-2023-40384",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40384"
},
{
"cve": "CVE-2023-40385",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40385"
},
{
"cve": "CVE-2023-40391",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40391"
},
{
"cve": "CVE-2023-40395",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40395"
},
{
"cve": "CVE-2023-40399",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40399"
},
{
"cve": "CVE-2023-40400",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40400"
},
{
"cve": "CVE-2023-40403",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40403"
},
{
"cve": "CVE-2023-40409",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40409"
},
{
"cve": "CVE-2023-40410",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40410"
},
{
"cve": "CVE-2023-40412",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40412"
},
{
"cve": "CVE-2023-40414",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40414"
},
{
"cve": "CVE-2023-40417",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40417"
},
{
"cve": "CVE-2023-40419",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40419"
},
{
"cve": "CVE-2023-40420",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40420"
},
{
"cve": "CVE-2023-40424",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40424"
},
{
"cve": "CVE-2023-40427",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40427"
},
{
"cve": "CVE-2023-40428",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40428"
},
{
"cve": "CVE-2023-40429",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40429"
},
{
"cve": "CVE-2023-40431",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40431"
},
{
"cve": "CVE-2023-40432",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40432"
},
{
"cve": "CVE-2023-40434",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40434"
},
{
"cve": "CVE-2023-40441",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40441"
},
{
"cve": "CVE-2023-40443",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40443"
},
{
"cve": "CVE-2023-40448",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40448"
},
{
"cve": "CVE-2023-40452",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40452"
},
{
"cve": "CVE-2023-40454",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40454"
},
{
"cve": "CVE-2023-40456",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40456"
},
{
"cve": "CVE-2023-40520",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40520"
},
{
"cve": "CVE-2023-40528",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40528"
},
{
"cve": "CVE-2023-40529",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40529"
},
{
"cve": "CVE-2023-41060",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41060"
},
{
"cve": "CVE-2023-41063",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41063"
},
{
"cve": "CVE-2023-41065",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41065"
},
{
"cve": "CVE-2023-41068",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41068"
},
{
"cve": "CVE-2023-41069",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41069"
},
{
"cve": "CVE-2023-41070",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41070"
},
{
"cve": "CVE-2023-41071",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41071"
},
{
"cve": "CVE-2023-41073",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41073"
},
{
"cve": "CVE-2023-41074",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41074"
},
{
"cve": "CVE-2023-41174",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41174"
},
{
"cve": "CVE-2023-41232",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41232"
},
{
"cve": "CVE-2023-41968",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41968"
},
{
"cve": "CVE-2023-41974",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41974"
},
{
"cve": "CVE-2023-41980",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41980"
},
{
"cve": "CVE-2023-41981",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41981"
},
{
"cve": "CVE-2023-41984",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41984"
},
{
"cve": "CVE-2023-41986",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41986"
},
{
"cve": "CVE-2023-41991",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41991"
},
{
"cve": "CVE-2023-41992",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41992"
},
{
"cve": "CVE-2023-41993",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41993"
},
{
"cve": "CVE-2023-41995",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41995"
},
{
"cve": "CVE-2023-42833",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42833"
},
{
"cve": "CVE-2023-42870",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42870"
},
{
"cve": "CVE-2023-42871",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42871"
},
{
"cve": "CVE-2023-42872",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42872"
},
{
"cve": "CVE-2023-42875",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42875"
},
{
"cve": "CVE-2023-42925",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42925"
},
{
"cve": "CVE-2023-42934",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42934"
},
{
"cve": "CVE-2023-42949",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42949"
},
{
"cve": "CVE-2023-42957",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42957"
},
{
"cve": "CVE-2023-42961",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42961"
},
{
"cve": "CVE-2023-42969",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42969"
},
{
"cve": "CVE-2023-42970",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42970"
},
{
"cve": "CVE-2023-42973",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42973"
},
{
"cve": "CVE-2023-42977",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42977"
}
]
}
WID-SEC-W-2026-0705
Vulnerability from csaf_certbund - Published: 2026-03-11 23:00 - Updated: 2026-03-12 23:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <15.8.7
Apple / iPadOS
|
<15.8.7 | ||
|
Apple iOS <15.8.7
Apple / iOS
|
<15.8.7 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <15.8.7
Apple / iPadOS
|
<15.8.7 | ||
|
Apple iOS <15.8.7
Apple / iOS
|
<15.8.7 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iPadOS <15.8.7
Apple / iPadOS
|
<15.8.7 | ||
|
Apple iOS <15.8.7
Apple / iOS
|
<15.8.7 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple iOS <16.7.15
Apple / iOS
|
<16.7.15 | ||
|
Apple iPadOS <16.7.15
Apple / iPadOS
|
<16.7.15 | ||
|
Apple iPadOS <15.8.7
Apple / iPadOS
|
<15.8.7 | ||
|
Apple iOS <15.8.7
Apple / iOS
|
<15.8.7 |
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Das Apple iOS (vormals iPhone OS) ist das Betriebssystem f\u00fcr das von Apple entwickelte Smartphone iPhone, iPad und iPod Touch.\r\nDas Apple iPadOS ist das Betriebssystem f\u00fcr das von Apple entwickelte iPad.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Apple iOS und Apple iPadOS ausnutzen, um beliebigen Code auszuf\u00fchren oder eine Speicherbesch\u00e4digung mit unbestimmten Folgen zu erreichen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- iPhoneOS\n- MacOS X",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-0705 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0705.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-0705 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0705"
},
{
"category": "external",
"summary": "Apple Security Update vom 2026-03-11",
"url": "https://support.apple.com/en-us/126632"
},
{
"category": "external",
"summary": "Apple Security Update vom 2026-03-11",
"url": "https://support.apple.com/en-us/126646"
},
{
"category": "external",
"summary": "Google Threat Intelligence Blog vom 2026-03-12",
"url": "https://cloud.google.com/blog/topics/threat-intelligence/coruna-powerful-ios-exploit-kit?linkId=59478481"
}
],
"source_lang": "en-US",
"title": "Apple iOS und iPadOS: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-03-12T23:00:00.000+00:00",
"generator": {
"date": "2026-03-12T14:21:42.262+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-0705",
"initial_release_date": "2026-03-11T23:00:00.000+00:00",
"revision_history": [
{
"date": "2026-03-11T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-03-12T23:00:00.000+00:00",
"number": "2",
"summary": "CVE-2023-41974, CVE-2023-43000, CVE-2024-23222 werden ausgenutzt"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c15.8.7",
"product": {
"name": "Apple iOS \u003c15.8.7",
"product_id": "T051676"
}
},
{
"category": "product_version",
"name": "15.8.7",
"product": {
"name": "Apple iOS 15.8.7",
"product_id": "T051676-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:iphone_os:15.8.7"
}
}
},
{
"category": "product_version_range",
"name": "\u003c16.7.15",
"product": {
"name": "Apple iOS \u003c16.7.15",
"product_id": "T051680"
}
},
{
"category": "product_version",
"name": "16.7.15",
"product": {
"name": "Apple iOS 16.7.15",
"product_id": "T051680-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:iphone_os:16.7.15"
}
}
}
],
"category": "product_name",
"name": "iOS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c15.8.7",
"product": {
"name": "Apple iPadOS \u003c15.8.7",
"product_id": "T051678"
}
},
{
"category": "product_version",
"name": "15.8.7",
"product": {
"name": "Apple iPadOS 15.8.7",
"product_id": "T051678-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:ipados:15.8.7"
}
}
},
{
"category": "product_version_range",
"name": "\u003c16.7.15",
"product": {
"name": "Apple iPadOS \u003c16.7.15",
"product_id": "T051679"
}
},
{
"category": "product_version",
"name": "16.7.15",
"product": {
"name": "Apple iPadOS 16.7.15",
"product_id": "T051679-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:ipados:16.7.15"
}
}
}
],
"category": "product_name",
"name": "iPadOS"
}
],
"category": "vendor",
"name": "Apple"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-41974",
"product_status": {
"known_affected": [
"T051678",
"T051676"
]
},
"release_date": "2026-03-11T23:00:00.000+00:00",
"title": "CVE-2023-41974"
},
{
"cve": "CVE-2023-43000",
"product_status": {
"known_affected": [
"T051678",
"T051676"
]
},
"release_date": "2026-03-11T23:00:00.000+00:00",
"title": "CVE-2023-43000"
},
{
"cve": "CVE-2024-23222",
"product_status": {
"known_affected": [
"T051678",
"T051676"
]
},
"release_date": "2026-03-11T23:00:00.000+00:00",
"title": "CVE-2024-23222"
},
{
"cve": "CVE-2023-43010",
"product_status": {
"known_affected": [
"T051680",
"T051679",
"T051678",
"T051676"
]
},
"release_date": "2026-03-11T23:00:00.000+00:00",
"title": "CVE-2023-43010"
}
]
}
NCSC-2026-0098
Vulnerability from csaf_ncscnl - Published: 2026-03-13 08:41 - Updated: 2026-03-13 08:41iOS 17 and iPadOS 17 released on September 18, 2023, address multiple security vulnerabilities including a critical use-after-free flaw that could allow arbitrary code execution with kernel privileges.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / iOS
|
vers:unknown/* | ||
|
vers:unknown/*
Apple / iPadOS
|
vers:unknown/* |
Multiple Apple operating systems and WebKit-based products have received updates addressing critical security vulnerabilities including arbitrary code execution, type confusion, privacy leaks, and denial-of-service across components such as Apple Neural Engine, Kernel, WebKit, and CoreCrypto.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / iOS
|
vers:unknown/* | ||
|
vers:unknown/*
Apple / iPadOS
|
vers:unknown/* |
A use-after-free vulnerability causing potential memory corruption was fixed in Apple’s macOS, iOS, iPadOS, Safari 16.6, and WebKitGTK by improving memory management when processing malicious web content.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / iOS
|
vers:unknown/* | ||
|
vers:unknown/*
Apple / iPadOS
|
vers:unknown/* |
A memory corruption vulnerability caused by processing malicious web content was fixed through improved memory handling in Apple OS versions including iOS 17.2, iPadOS 17.2, macOS Sonoma 14.2, and Safari 17.2.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Apple / iOS
|
vers:unknown/* | ||
|
vers:unknown/*
Apple / iPadOS
|
vers:unknown/* |
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Apple heeft kwetsbaarheden verholpen in iOS 15 \u0026 16 en iPadOS 15 \u0026 16",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden bevinden zich in de manier waarop geheugen wordt beheerd in verschillende Apple-producten. Een aanvaller kan deze kwetsbaarheden misbruiken door kwaadaardige webinhoud te verwerken, wat kan leiden tot geheugenbeschadiging en mogelijk tot het uitvoeren van willekeurige code met kernelprivileges.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Apple heeft verbeterde geheugenbeheersmechanismen ge\u00efmplementeerd in de getroffen producten om deze kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference",
"url": "https://support.apple.com/en-us/126632"
},
{
"category": "external",
"summary": "Reference",
"url": "https://support.apple.com/en-us/126646"
}
],
"title": "Kwetsbaarheden verholpen in Apple iOS en iPadOS",
"tracking": {
"current_release_date": "2026-03-13T08:41:19.155490Z",
"generator": {
"date": "2025-08-04T16:30:00Z",
"engine": {
"name": "V.A.",
"version": "1.3"
}
},
"id": "NCSC-2026-0098",
"initial_release_date": "2026-03-13T08:41:19.155490Z",
"revision_history": [
{
"date": "2026-03-13T08:41:19.155490Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-1"
}
}
],
"category": "product_name",
"name": "iOS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-2"
}
}
],
"category": "product_name",
"name": "iPadOS"
}
],
"category": "vendor",
"name": "Apple"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-41974",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "iOS 17 and iPadOS 17 released on September 18, 2023, address multiple security vulnerabilities including a critical use-after-free flaw that could allow arbitrary code execution with kernel privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-41974 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-41974.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2"
]
}
],
"title": "CVE-2023-41974"
},
{
"cve": "CVE-2024-23222",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "other",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
},
{
"category": "description",
"text": "Multiple Apple operating systems and WebKit-based products have received updates addressing critical security vulnerabilities including arbitrary code execution, type confusion, privacy leaks, and denial-of-service across components such as Apple Neural Engine, Kernel, WebKit, and CoreCrypto.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-23222 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-23222.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2"
]
}
],
"title": "CVE-2024-23222"
},
{
"cve": "CVE-2023-43000",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "A use-after-free vulnerability causing potential memory corruption was fixed in Apple\u2019s macOS, iOS, iPadOS, Safari 16.6, and WebKitGTK by improving memory management when processing malicious web content.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-43000 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-43000.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2"
]
}
],
"title": "CVE-2023-43000"
},
{
"cve": "CVE-2023-43010",
"notes": [
{
"category": "description",
"text": "A memory corruption vulnerability caused by processing malicious web content was fixed through improved memory handling in Apple OS versions including iOS 17.2, iPadOS 17.2, macOS Sonoma 14.2, and Safari 17.2.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-43010 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-43010.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2"
]
}
],
"title": "CVE-2023-43010"
}
]
}
GSD-2023-41974
Vulnerability from gsd - Updated: 2023-12-13 01:20{
"GSD": {
"alias": "CVE-2023-41974",
"id": "GSD-2023-41974"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2023-41974"
],
"details": "A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 17 and iPadOS 17. An app may be able to execute arbitrary code with kernel privileges.",
"id": "GSD-2023-41974",
"modified": "2023-12-13T01:20:45.126143Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2023-41974",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "iOS and iPadOS",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "unspecified",
"version_value": "17"
}
]
}
}
]
},
"vendor_name": "Apple"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 17 and iPadOS 17. An app may be able to execute arbitrary code with kernel privileges."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "An app may be able to execute arbitrary code with kernel privileges"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.apple.com/en-us/HT213938",
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT213938"
}
]
}
},
"nvd.nist.gov": {
"cve": {
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B511B802-B0A2-412D-ADA4-8B783BDF1880",
"versionEndExcluding": "17.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E22CC7F9-F302-40B1-9B02-00FBC9805199",
"versionEndExcluding": "17.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 17 and iPadOS 17. An app may be able to execute arbitrary code with kernel privileges."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de use after free con una gesti\u00f3n de memoria mejorada. Este problema se solucion\u00f3 en iOS 17 y iPadOS 17. Es posible que una aplicaci\u00f3n pueda ejecutar c\u00f3digo arbitrario con privilegios del kernel."
}
],
"id": "CVE-2023-41974",
"lastModified": "2024-01-17T21:17:26.303",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2024-01-10T22:15:49.240",
"references": [
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213938"
}
],
"sourceIdentifier": "product-security@apple.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
}
}
}
GHSA-58C3-HJFX-2GMQ
Vulnerability from github – Published: 2024-01-11 00:30 – Updated: 2026-03-12 03:31A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 17 and iPadOS 17. An app may be able to execute arbitrary code with kernel privileges.
{
"affected": [],
"aliases": [
"CVE-2023-41974"
],
"database_specific": {
"cwe_ids": [
"CWE-416"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-01-10T22:15:49Z",
"severity": "HIGH"
},
"details": "A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 17 and iPadOS 17. An app may be able to execute arbitrary code with kernel privileges.",
"id": "GHSA-58c3-hjfx-2gmq",
"modified": "2026-03-12T03:31:05Z",
"published": "2024-01-11T00:30:25Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41974"
},
{
"type": "WEB",
"url": "https://cloud.google.com/blog/topics/threat-intelligence/coruna-powerful-ios-exploit-kit"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/120949"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/126632"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/HT213938"
},
{
"type": "WEB",
"url": "https://support.apple.com/kb/HT213938"
},
{
"type": "WEB",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-41974"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.