Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-41995 (GCVE-0-2023-41995)
Vulnerability from cvelistv5 – Published: 2023-09-26 20:14 – Updated: 2025-11-04 19:21- An app may be able to execute arbitrary code with kernel privileges
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Apple | iOS and iPadOS |
Affected:
unspecified , < 17
(custom)
|
||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T19:21:47.151Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://support.apple.com/en-us/HT213938"
},
{
"tags": [
"x_transferred"
],
"url": "https://support.apple.com/en-us/HT213940"
},
{
"tags": [
"x_transferred"
],
"url": "https://support.apple.com/kb/HT213841"
},
{
"tags": [
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2023/Oct/8"
},
{
"tags": [
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2023/Oct/3"
},
{
"url": "https://support.apple.com/kb/HT213940"
},
{
"url": "https://support.apple.com/kb/HT213938"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "iOS and iPadOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "17",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "macOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "14",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to execute arbitrary code with kernel privileges."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "An app may be able to execute arbitrary code with kernel privileges",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-10-31T23:06:18.007Z",
"orgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"shortName": "apple"
},
"references": [
{
"url": "https://support.apple.com/en-us/HT213938"
},
{
"url": "https://support.apple.com/en-us/HT213940"
},
{
"url": "https://support.apple.com/kb/HT213841"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Oct/8"
},
{
"url": "http://seclists.org/fulldisclosure/2023/Oct/3"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"assignerShortName": "apple",
"cveId": "CVE-2023-41995",
"datePublished": "2023-09-26T20:14:49.645Z",
"dateReserved": "2023-09-06T17:40:06.142Z",
"dateUpdated": "2025-11-04T19:21:47.151Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"16.6\", \"matchCriteriaId\": \"F362BEC4-90C7-4305-BFF9-645FE6C52DFE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"16.6\", \"matchCriteriaId\": \"DB63BAC2-C756-428C-8BAC-BAD39FBE5EF4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"14.0\", \"matchCriteriaId\": \"7A5DD3D5-FB4F-4313-B873-DCED87FC4605\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to execute arbitrary code with kernel privileges.\"}, {\"lang\": \"es\", \"value\": \"Se solucion\\u00f3 un problema de use-after-free con una gesti\\u00f3n de memoria mejorada. Este problema se solucion\\u00f3 en iOS 17 y iPadOS 17, macOS Sonoma 14. Es posible que una aplicaci\\u00f3n pueda ejecutar c\\u00f3digo arbitrario con privilegios del kernel.\"}]",
"id": "CVE-2023-41995",
"lastModified": "2024-11-21T08:22:04.573",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 5.9}]}",
"published": "2023-09-27T15:19:32.353",
"references": "[{\"url\": \"http://seclists.org/fulldisclosure/2023/Oct/3\", \"source\": \"product-security@apple.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2023/Oct/8\", \"source\": \"product-security@apple.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://support.apple.com/en-us/HT213938\", \"source\": \"product-security@apple.com\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://support.apple.com/en-us/HT213940\", \"source\": \"product-security@apple.com\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://support.apple.com/kb/HT213841\", \"source\": \"product-security@apple.com\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2023/Oct/3\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2023/Oct/8\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://support.apple.com/en-us/HT213938\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://support.apple.com/en-us/HT213940\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://support.apple.com/kb/HT213841\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}]",
"sourceIdentifier": "product-security@apple.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-416\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2023-41995\",\"sourceIdentifier\":\"product-security@apple.com\",\"published\":\"2023-09-27T15:19:32.353\",\"lastModified\":\"2025-11-04T20:16:48.523\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to execute arbitrary code with kernel privileges.\"},{\"lang\":\"es\",\"value\":\"Se solucion\u00f3 un problema de use-after-free con una gesti\u00f3n de memoria mejorada. Este problema se solucion\u00f3 en iOS 17 y iPadOS 17, macOS Sonoma 14. Es posible que una aplicaci\u00f3n pueda ejecutar c\u00f3digo arbitrario con privilegios del kernel.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"16.6\",\"matchCriteriaId\":\"F362BEC4-90C7-4305-BFF9-645FE6C52DFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"16.6\",\"matchCriteriaId\":\"DB63BAC2-C756-428C-8BAC-BAD39FBE5EF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"14.0\",\"matchCriteriaId\":\"7A5DD3D5-FB4F-4313-B873-DCED87FC4605\"}]}]}],\"references\":[{\"url\":\"http://seclists.org/fulldisclosure/2023/Oct/3\",\"source\":\"product-security@apple.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2023/Oct/8\",\"source\":\"product-security@apple.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213938\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213940\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT213841\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2023/Oct/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2023/Oct/8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213938\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213940\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT213841\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT213938\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.apple.com/kb/HT213940\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
WID-SEC-W-2023-2454
Vulnerability from csaf_certbund - Published: 2023-09-26 22:00 - Updated: 2025-04-13 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "kritisch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Das Apple iOS (vormals iPhone OS) ist das Betriebssystem f\u00fcr das von Apple entwickelte Smartphone iPhone, iPad und iPod Touch.\r\nDas Apple iPadOS ist das Betriebssystem f\u00fcr das von Apple entwickelte iPad.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apple iOS und Apple iPadOS ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen preiszugeben, Dateien zu manipulieren oder seine Privilegien zu erweitern.",
"title": "Angriff"
},
{
"category": "general",
"text": "- iPhoneOS",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-2454 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2454.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-2454 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2454"
},
{
"category": "external",
"summary": "Apple Security Update vom 2023-09-26",
"url": "https://support.apple.com/en-us/HT213927"
},
{
"category": "external",
"summary": "Apple Security Update vom 2023-09-26",
"url": "https://support.apple.com/en-us/HT213938"
}
],
"source_lang": "en-US",
"title": "Apple iOS und iPadOS: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-04-13T22:00:00.000+00:00",
"generator": {
"date": "2025-04-14T08:21:12.759+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2023-2454",
"initial_release_date": "2023-09-26T22:00:00.000+00:00",
"revision_history": [
{
"date": "2023-09-26T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-09-28T22:00:00.000+00:00",
"number": "2",
"summary": "Korrektur"
},
{
"date": "2024-01-22T23:00:00.000+00:00",
"number": "3",
"summary": "CVE\u0027s erg\u00e4nzt"
},
{
"date": "2025-04-13T22:00:00.000+00:00",
"number": "4",
"summary": "CVE-Nummern erg\u00e4nzt"
}
],
"status": "final",
"version": "4"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c16.7",
"product": {
"name": "Apple iOS \u003c16.7",
"product_id": "T030084"
}
},
{
"category": "product_version",
"name": "16.7",
"product": {
"name": "Apple iOS 16.7",
"product_id": "T030084-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:iphone_os:16.7"
}
}
},
{
"category": "product_version_range",
"name": "\u003c17",
"product": {
"name": "Apple iOS \u003c17",
"product_id": "T030087"
}
},
{
"category": "product_version",
"name": "17",
"product": {
"name": "Apple iOS 17",
"product_id": "T030087-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:iphone_os:17"
}
}
}
],
"category": "product_name",
"name": "iOS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c16.7",
"product": {
"name": "Apple iPadOS \u003c16.7",
"product_id": "T030085"
}
},
{
"category": "product_version",
"name": "16.7",
"product": {
"name": "Apple iPadOS 16.7",
"product_id": "T030085-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:ipados:16.7"
}
}
},
{
"category": "product_version_range",
"name": "\u003c17",
"product": {
"name": "Apple iPadOS \u003c17",
"product_id": "T030086"
}
},
{
"category": "product_version",
"name": "17",
"product": {
"name": "Apple iPadOS 17",
"product_id": "T030086-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:ipados:17"
}
}
}
],
"category": "product_name",
"name": "iPadOS"
}
],
"category": "vendor",
"name": "Apple"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-32361",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-32361"
},
{
"cve": "CVE-2023-32396",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-32396"
},
{
"cve": "CVE-2023-35074",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-35074"
},
{
"cve": "CVE-2023-35984",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-35984"
},
{
"cve": "CVE-2023-35990",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-35990"
},
{
"cve": "CVE-2023-38596",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-38596"
},
{
"cve": "CVE-2023-38610",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-38610"
},
{
"cve": "CVE-2023-38612",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-38612"
},
{
"cve": "CVE-2023-38614",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-38614"
},
{
"cve": "CVE-2023-39434",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-39434"
},
{
"cve": "CVE-2023-40384",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40384"
},
{
"cve": "CVE-2023-40385",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40385"
},
{
"cve": "CVE-2023-40391",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40391"
},
{
"cve": "CVE-2023-40395",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40395"
},
{
"cve": "CVE-2023-40399",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40399"
},
{
"cve": "CVE-2023-40400",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40400"
},
{
"cve": "CVE-2023-40403",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40403"
},
{
"cve": "CVE-2023-40409",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40409"
},
{
"cve": "CVE-2023-40410",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40410"
},
{
"cve": "CVE-2023-40412",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40412"
},
{
"cve": "CVE-2023-40414",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40414"
},
{
"cve": "CVE-2023-40417",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40417"
},
{
"cve": "CVE-2023-40419",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40419"
},
{
"cve": "CVE-2023-40420",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40420"
},
{
"cve": "CVE-2023-40424",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40424"
},
{
"cve": "CVE-2023-40427",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40427"
},
{
"cve": "CVE-2023-40428",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40428"
},
{
"cve": "CVE-2023-40429",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40429"
},
{
"cve": "CVE-2023-40431",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40431"
},
{
"cve": "CVE-2023-40432",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40432"
},
{
"cve": "CVE-2023-40434",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40434"
},
{
"cve": "CVE-2023-40441",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40441"
},
{
"cve": "CVE-2023-40443",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40443"
},
{
"cve": "CVE-2023-40448",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40448"
},
{
"cve": "CVE-2023-40452",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40452"
},
{
"cve": "CVE-2023-40454",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40454"
},
{
"cve": "CVE-2023-40456",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40456"
},
{
"cve": "CVE-2023-40520",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40520"
},
{
"cve": "CVE-2023-40528",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40528"
},
{
"cve": "CVE-2023-40529",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40529"
},
{
"cve": "CVE-2023-41060",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41060"
},
{
"cve": "CVE-2023-41063",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41063"
},
{
"cve": "CVE-2023-41065",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41065"
},
{
"cve": "CVE-2023-41068",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41068"
},
{
"cve": "CVE-2023-41069",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41069"
},
{
"cve": "CVE-2023-41070",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41070"
},
{
"cve": "CVE-2023-41071",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41071"
},
{
"cve": "CVE-2023-41073",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41073"
},
{
"cve": "CVE-2023-41074",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41074"
},
{
"cve": "CVE-2023-41174",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41174"
},
{
"cve": "CVE-2023-41232",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41232"
},
{
"cve": "CVE-2023-41968",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41968"
},
{
"cve": "CVE-2023-41974",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41974"
},
{
"cve": "CVE-2023-41980",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41980"
},
{
"cve": "CVE-2023-41981",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41981"
},
{
"cve": "CVE-2023-41984",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41984"
},
{
"cve": "CVE-2023-41986",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41986"
},
{
"cve": "CVE-2023-41991",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41991"
},
{
"cve": "CVE-2023-41992",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41992"
},
{
"cve": "CVE-2023-41993",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41993"
},
{
"cve": "CVE-2023-41995",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41995"
},
{
"cve": "CVE-2023-42833",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42833"
},
{
"cve": "CVE-2023-42870",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42870"
},
{
"cve": "CVE-2023-42871",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42871"
},
{
"cve": "CVE-2023-42872",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42872"
},
{
"cve": "CVE-2023-42875",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42875"
},
{
"cve": "CVE-2023-42925",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42925"
},
{
"cve": "CVE-2023-42934",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42934"
},
{
"cve": "CVE-2023-42949",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42949"
},
{
"cve": "CVE-2023-42957",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42957"
},
{
"cve": "CVE-2023-42961",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42961"
},
{
"cve": "CVE-2023-42969",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42969"
},
{
"cve": "CVE-2023-42970",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42970"
},
{
"cve": "CVE-2023-42973",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42973"
},
{
"cve": "CVE-2023-42977",
"product_status": {
"known_affected": [
"T030084",
"T030086",
"T030085",
"T030087"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42977"
}
]
}
WID-SEC-W-2023-2453
Vulnerability from csaf_certbund - Published: 2023-09-26 22:00 - Updated: 2025-04-13 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "kritisch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter oder lokaler Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Rechte zu erweitern oder Daten zu manipulieren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- MacOS X",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-2453 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2453.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-2453 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2453"
},
{
"category": "external",
"summary": "Apple Security Advisory vom 2023-09-26",
"url": "https://support.apple.com/en-us/HT213931"
},
{
"category": "external",
"summary": "Apple Security Advisory vom 2023-09-26",
"url": "https://support.apple.com/en-us/HT213932"
},
{
"category": "external",
"summary": "Apple Security Advisory vom 2023-09-26",
"url": "https://support.apple.com/en-us/HT213940"
}
],
"source_lang": "en-US",
"title": "Apple macOS: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-04-13T22:00:00.000+00:00",
"generator": {
"date": "2025-04-14T08:21:12.074+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2023-2453",
"initial_release_date": "2023-09-26T22:00:00.000+00:00",
"revision_history": [
{
"date": "2023-09-26T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-10-25T22:00:00.000+00:00",
"number": "2",
"summary": "CVE erg\u00e4nzt"
},
{
"date": "2024-01-22T23:00:00.000+00:00",
"number": "3",
"summary": "CVE\u0027s erg\u00e4nzt"
},
{
"date": "2025-04-13T22:00:00.000+00:00",
"number": "4",
"summary": "CVE-Nummern erg\u00e4nzt"
}
],
"status": "final",
"version": "4"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Ventura \u003c13.6",
"product": {
"name": "Apple macOS Ventura \u003c13.6",
"product_id": "T030093"
}
},
{
"category": "product_version",
"name": "Ventura 13.6",
"product": {
"name": "Apple macOS Ventura 13.6",
"product_id": "T030093-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:ventura__13.6"
}
}
},
{
"category": "product_version_range",
"name": "Monterey \u003c12.7",
"product": {
"name": "Apple macOS Monterey \u003c12.7",
"product_id": "T030094"
}
},
{
"category": "product_version",
"name": "Monterey 12.7",
"product": {
"name": "Apple macOS Monterey 12.7",
"product_id": "T030094-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:monterey__12.7"
}
}
},
{
"category": "product_version_range",
"name": "Sonoma \u003c14",
"product": {
"name": "Apple macOS Sonoma \u003c14",
"product_id": "T030095"
}
},
{
"category": "product_version",
"name": "Sonoma 14",
"product": {
"name": "Apple macOS Sonoma 14",
"product_id": "T030095-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:sonoma__14"
}
}
}
],
"category": "product_name",
"name": "macOS"
}
],
"category": "vendor",
"name": "Apple"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-23495",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-23495"
},
{
"cve": "CVE-2023-29497",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-29497"
},
{
"cve": "CVE-2023-32361",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-32361"
},
{
"cve": "CVE-2023-32377",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-32377"
},
{
"cve": "CVE-2023-32396",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-32396"
},
{
"cve": "CVE-2023-32421",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-32421"
},
{
"cve": "CVE-2023-35074",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-35074"
},
{
"cve": "CVE-2023-35984",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-35984"
},
{
"cve": "CVE-2023-35990",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-35990"
},
{
"cve": "CVE-2023-37448",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-37448"
},
{
"cve": "CVE-2023-38586",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-38586"
},
{
"cve": "CVE-2023-38596",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-38596"
},
{
"cve": "CVE-2023-3860",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-3860"
},
{
"cve": "CVE-2023-38607",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-38607"
},
{
"cve": "CVE-2023-38615",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-38615"
},
{
"cve": "CVE-2023-39233",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-39233"
},
{
"cve": "CVE-2023-39434",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-39434"
},
{
"cve": "CVE-2023-40384",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40384"
},
{
"cve": "CVE-2023-40386",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40386"
},
{
"cve": "CVE-2023-40388",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40388"
},
{
"cve": "CVE-2023-40391",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40391"
},
{
"cve": "CVE-2023-40393",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40393"
},
{
"cve": "CVE-2023-40395",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40395"
},
{
"cve": "CVE-2023-40396",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40396"
},
{
"cve": "CVE-2023-40399",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40399"
},
{
"cve": "CVE-2023-40400",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40400"
},
{
"cve": "CVE-2023-40402",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40402"
},
{
"cve": "CVE-2023-40403",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40403"
},
{
"cve": "CVE-2023-40406",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40406"
},
{
"cve": "CVE-2023-40407",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40407"
},
{
"cve": "CVE-2023-40409",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40409"
},
{
"cve": "CVE-2023-40410",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40410"
},
{
"cve": "CVE-2023-40411",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40411"
},
{
"cve": "CVE-2023-40412",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40412"
},
{
"cve": "CVE-2023-40417",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40417"
},
{
"cve": "CVE-2023-40420",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40420"
},
{
"cve": "CVE-2023-40422",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40422"
},
{
"cve": "CVE-2023-40424",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40424"
},
{
"cve": "CVE-2023-40426",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40426"
},
{
"cve": "CVE-2023-40427",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40427"
},
{
"cve": "CVE-2023-40429",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40429"
},
{
"cve": "CVE-2023-40430",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40430"
},
{
"cve": "CVE-2023-40432",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40432"
},
{
"cve": "CVE-2023-40434",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40434"
},
{
"cve": "CVE-2023-40436",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40436"
},
{
"cve": "CVE-2023-40438",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40438"
},
{
"cve": "CVE-2023-40441",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40441"
},
{
"cve": "CVE-2023-40448",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40448"
},
{
"cve": "CVE-2023-40450",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40450"
},
{
"cve": "CVE-2023-40452",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40452"
},
{
"cve": "CVE-2023-40454",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40454"
},
{
"cve": "CVE-2023-40455",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40455"
},
{
"cve": "CVE-2023-40541",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-40541"
},
{
"cve": "CVE-2023-41063",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41063"
},
{
"cve": "CVE-2023-41065",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41065"
},
{
"cve": "CVE-2023-41066",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41066"
},
{
"cve": "CVE-2023-41067",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41067"
},
{
"cve": "CVE-2023-41070",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41070"
},
{
"cve": "CVE-2023-41071",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41071"
},
{
"cve": "CVE-2023-41073",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41073"
},
{
"cve": "CVE-2023-41074",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41074"
},
{
"cve": "CVE-2023-41076",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41076"
},
{
"cve": "CVE-2023-41078",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41078"
},
{
"cve": "CVE-2023-41079",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41079"
},
{
"cve": "CVE-2023-41232",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41232"
},
{
"cve": "CVE-2023-41968",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41968"
},
{
"cve": "CVE-2023-41979",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41979"
},
{
"cve": "CVE-2023-41980",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41980"
},
{
"cve": "CVE-2023-41981",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41981"
},
{
"cve": "CVE-2023-41984",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41984"
},
{
"cve": "CVE-2023-41986",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41986"
},
{
"cve": "CVE-2023-41987",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41987"
},
{
"cve": "CVE-2023-41991",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41991"
},
{
"cve": "CVE-2023-41992",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41992"
},
{
"cve": "CVE-2023-41993",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41993"
},
{
"cve": "CVE-2023-41994",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41994"
},
{
"cve": "CVE-2023-41995",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41995"
},
{
"cve": "CVE-2023-41996",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-41996"
},
{
"cve": "CVE-2023-42826",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42826"
},
{
"cve": "CVE-2023-42876",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42876"
},
{
"cve": "CVE-2023-42918",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42918"
},
{
"cve": "CVE-2023-42929",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42929"
},
{
"cve": "CVE-2023-42933",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42933"
},
{
"cve": "CVE-2023-42934",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42934"
},
{
"cve": "CVE-2023-42943",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42943"
},
{
"cve": "CVE-2023-42948",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42948"
},
{
"cve": "CVE-2023-42949",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42949"
},
{
"cve": "CVE-2023-42957",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42957"
},
{
"cve": "CVE-2023-42959",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42959"
},
{
"cve": "CVE-2023-42961",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42961"
},
{
"cve": "CVE-2023-42969",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42969"
},
{
"cve": "CVE-2023-42970",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42970"
},
{
"cve": "CVE-2023-42977",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42977"
},
{
"cve": "CVE-2023-42981",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42981"
},
{
"cve": "CVE-2023-42982",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42982"
},
{
"cve": "CVE-2023-42983",
"product_status": {
"known_affected": [
"T030093",
"T030095",
"T030094"
]
},
"release_date": "2023-09-26T22:00:00.000+00:00",
"title": "CVE-2023-42983"
}
]
}
CERTFR-2023-AVI-0784
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et une exécution de code arbitraire à distance.
Apple indique que la vulnérabilité CVE-2023-41993 est activement exploitée dans le cadre d 'attaques ciblées sur des versions d'iOS antérieures à 16.7.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | N/A | watchOS versions antérieures à 10 | ||
| Apple | N/A | tvOS versions antérieures à 17 | ||
| Apple | N/A | iOS et iPadOS versions antérieures à 16.7 ou 17 | ||
| Apple | N/A | Xcode versions antérieures à 15 | ||
| Apple | macOS | macOS Sonoma versions antérieures à 14 | ||
| Apple | Safari | Safari versions antérieures à 17 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "watchOS versions ant\u00e9rieures \u00e0 10",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "tvOS versions ant\u00e9rieures \u00e0 17",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS et iPadOS versions ant\u00e9rieures \u00e0 16.7 ou 17",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Xcode versions ant\u00e9rieures \u00e0 15",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Sonoma versions ant\u00e9rieures \u00e0 14",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Safari versions ant\u00e9rieures \u00e0 17",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-40454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40454"
},
{
"name": "CVE-2023-38596",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38596"
},
{
"name": "CVE-2023-23495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23495"
},
{
"name": "CVE-2023-40434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40434"
},
{
"name": "CVE-2023-40384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40384"
},
{
"name": "CVE-2023-40429",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40429"
},
{
"name": "CVE-2023-40432",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40432"
},
{
"name": "CVE-2023-35074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35074"
},
{
"name": "CVE-2023-41078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41078"
},
{
"name": "CVE-2023-40406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40406"
},
{
"name": "CVE-2023-39233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39233"
},
{
"name": "CVE-2023-40448",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40448"
},
{
"name": "CVE-2023-29497",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29497"
},
{
"name": "CVE-2023-41980",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41980"
},
{
"name": "CVE-2023-41068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41068"
},
{
"name": "CVE-2023-40435",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40435"
},
{
"name": "CVE-2023-40427",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40427"
},
{
"name": "CVE-2023-40391",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40391"
},
{
"name": "CVE-2023-40451",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40451"
},
{
"name": "CVE-2023-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38615"
},
{
"name": "CVE-2023-40400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40400"
},
{
"name": "CVE-2023-40395",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40395"
},
{
"name": "CVE-2023-40452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40452"
},
{
"name": "CVE-2023-40431",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40431"
},
{
"name": "CVE-2023-40418",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40418"
},
{
"name": "CVE-2023-41071",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41071"
},
{
"name": "CVE-2023-40443",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40443"
},
{
"name": "CVE-2023-41079",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41079"
},
{
"name": "CVE-2023-40455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40455"
},
{
"name": "CVE-2023-41981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41981"
},
{
"name": "CVE-2023-41066",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41066"
},
{
"name": "CVE-2023-40456",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40456"
},
{
"name": "CVE-2023-40402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40402"
},
{
"name": "CVE-2023-32361",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32361"
},
{
"name": "CVE-2023-41073",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41073"
},
{
"name": "CVE-2023-40422",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40422"
},
{
"name": "CVE-2023-35984",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35984"
},
{
"name": "CVE-2023-37448",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37448"
},
{
"name": "CVE-2023-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41232"
},
{
"name": "CVE-2023-41993",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41993"
},
{
"name": "CVE-2023-41067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41067"
},
{
"name": "CVE-2023-40399",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40399"
},
{
"name": "CVE-2023-35990",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35990"
},
{
"name": "CVE-2023-40407",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40407"
},
{
"name": "CVE-2023-40410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40410"
},
{
"name": "CVE-2023-32377",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32377"
},
{
"name": "CVE-2023-40541",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40541"
},
{
"name": "CVE-2023-40386",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40386"
},
{
"name": "CVE-2023-32396",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32396"
},
{
"name": "CVE-2023-39434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39434"
},
{
"name": "CVE-2023-32421",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32421"
},
{
"name": "CVE-2023-41968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41968"
},
{
"name": "CVE-2023-40419",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40419"
},
{
"name": "CVE-2023-41063",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41063"
},
{
"name": "CVE-2023-40409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40409"
},
{
"name": "CVE-2023-40424",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40424"
},
{
"name": "CVE-2023-41984",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41984"
},
{
"name": "CVE-2023-40426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40426"
},
{
"name": "CVE-2023-40412",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40412"
},
{
"name": "CVE-2023-40520",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40520"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2023-40428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40428"
},
{
"name": "CVE-2023-40450",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40450"
},
{
"name": "CVE-2023-41986",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41986"
},
{
"name": "CVE-2023-40417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40417"
},
{
"name": "CVE-2023-40441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40441"
},
{
"name": "CVE-2023-38586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38586"
},
{
"name": "CVE-2023-40388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40388"
},
{
"name": "CVE-2023-40436",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40436"
},
{
"name": "CVE-2023-41065",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41065"
},
{
"name": "CVE-2023-40420",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40420"
},
{
"name": "CVE-2023-41070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41070"
},
{
"name": "CVE-2023-41979",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41979"
},
{
"name": "CVE-2023-41174",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41174"
},
{
"name": "CVE-2023-41074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41074"
},
{
"name": "CVE-2023-41995",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41995"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0784",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-09-27T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Apple\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une ex\u00e9cution de code\narbitraire \u00e0 distance.\n\nApple indique que la vuln\u00e9rabilit\u00e9 CVE-2023-41993 est activement\nexploit\u00e9e dans le cadre d \u0027attaques cibl\u00e9es sur des versions d\u0027iOS\nant\u00e9rieures \u00e0 16.7.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213936 du 18 septembre 2023",
"url": "https://support.apple.com/en-us/HT213936"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213939 du 18 septembre 2023",
"url": "https://support.apple.com/en-us/HT213939"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213941 du 26 septembre 2023",
"url": "https://support.apple.com/en-us/HT213941"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213940 du 26 septembre 2023",
"url": "https://support.apple.com/en-us/HT213940"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213937 du 18 septembre 2023",
"url": "https://support.apple.com/en-us/HT213937"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213938 du 18 septembre 2023",
"url": "https://support.apple.com/en-us/HT213938"
}
]
}
CERTFR-2023-AVI-0784
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et une exécution de code arbitraire à distance.
Apple indique que la vulnérabilité CVE-2023-41993 est activement exploitée dans le cadre d 'attaques ciblées sur des versions d'iOS antérieures à 16.7.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | N/A | watchOS versions antérieures à 10 | ||
| Apple | N/A | tvOS versions antérieures à 17 | ||
| Apple | N/A | iOS et iPadOS versions antérieures à 16.7 ou 17 | ||
| Apple | N/A | Xcode versions antérieures à 15 | ||
| Apple | macOS | macOS Sonoma versions antérieures à 14 | ||
| Apple | Safari | Safari versions antérieures à 17 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "watchOS versions ant\u00e9rieures \u00e0 10",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "tvOS versions ant\u00e9rieures \u00e0 17",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS et iPadOS versions ant\u00e9rieures \u00e0 16.7 ou 17",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Xcode versions ant\u00e9rieures \u00e0 15",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Sonoma versions ant\u00e9rieures \u00e0 14",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Safari versions ant\u00e9rieures \u00e0 17",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-40454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40454"
},
{
"name": "CVE-2023-38596",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38596"
},
{
"name": "CVE-2023-23495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23495"
},
{
"name": "CVE-2023-40434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40434"
},
{
"name": "CVE-2023-40384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40384"
},
{
"name": "CVE-2023-40429",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40429"
},
{
"name": "CVE-2023-40432",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40432"
},
{
"name": "CVE-2023-35074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35074"
},
{
"name": "CVE-2023-41078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41078"
},
{
"name": "CVE-2023-40406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40406"
},
{
"name": "CVE-2023-39233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39233"
},
{
"name": "CVE-2023-40448",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40448"
},
{
"name": "CVE-2023-29497",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29497"
},
{
"name": "CVE-2023-41980",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41980"
},
{
"name": "CVE-2023-41068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41068"
},
{
"name": "CVE-2023-40435",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40435"
},
{
"name": "CVE-2023-40427",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40427"
},
{
"name": "CVE-2023-40391",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40391"
},
{
"name": "CVE-2023-40451",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40451"
},
{
"name": "CVE-2023-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38615"
},
{
"name": "CVE-2023-40400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40400"
},
{
"name": "CVE-2023-40395",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40395"
},
{
"name": "CVE-2023-40452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40452"
},
{
"name": "CVE-2023-40431",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40431"
},
{
"name": "CVE-2023-40418",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40418"
},
{
"name": "CVE-2023-41071",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41071"
},
{
"name": "CVE-2023-40443",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40443"
},
{
"name": "CVE-2023-41079",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41079"
},
{
"name": "CVE-2023-40455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40455"
},
{
"name": "CVE-2023-41981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41981"
},
{
"name": "CVE-2023-41066",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41066"
},
{
"name": "CVE-2023-40456",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40456"
},
{
"name": "CVE-2023-40402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40402"
},
{
"name": "CVE-2023-32361",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32361"
},
{
"name": "CVE-2023-41073",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41073"
},
{
"name": "CVE-2023-40422",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40422"
},
{
"name": "CVE-2023-35984",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35984"
},
{
"name": "CVE-2023-37448",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37448"
},
{
"name": "CVE-2023-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41232"
},
{
"name": "CVE-2023-41993",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41993"
},
{
"name": "CVE-2023-41067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41067"
},
{
"name": "CVE-2023-40399",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40399"
},
{
"name": "CVE-2023-35990",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35990"
},
{
"name": "CVE-2023-40407",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40407"
},
{
"name": "CVE-2023-40410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40410"
},
{
"name": "CVE-2023-32377",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32377"
},
{
"name": "CVE-2023-40541",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40541"
},
{
"name": "CVE-2023-40386",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40386"
},
{
"name": "CVE-2023-32396",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32396"
},
{
"name": "CVE-2023-39434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39434"
},
{
"name": "CVE-2023-32421",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32421"
},
{
"name": "CVE-2023-41968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41968"
},
{
"name": "CVE-2023-40419",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40419"
},
{
"name": "CVE-2023-41063",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41063"
},
{
"name": "CVE-2023-40409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40409"
},
{
"name": "CVE-2023-40424",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40424"
},
{
"name": "CVE-2023-41984",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41984"
},
{
"name": "CVE-2023-40426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40426"
},
{
"name": "CVE-2023-40412",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40412"
},
{
"name": "CVE-2023-40520",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40520"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2023-40428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40428"
},
{
"name": "CVE-2023-40450",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40450"
},
{
"name": "CVE-2023-41986",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41986"
},
{
"name": "CVE-2023-40417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40417"
},
{
"name": "CVE-2023-40441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40441"
},
{
"name": "CVE-2023-38586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38586"
},
{
"name": "CVE-2023-40388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40388"
},
{
"name": "CVE-2023-40436",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40436"
},
{
"name": "CVE-2023-41065",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41065"
},
{
"name": "CVE-2023-40420",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40420"
},
{
"name": "CVE-2023-41070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41070"
},
{
"name": "CVE-2023-41979",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41979"
},
{
"name": "CVE-2023-41174",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41174"
},
{
"name": "CVE-2023-41074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41074"
},
{
"name": "CVE-2023-41995",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41995"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0784",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-09-27T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Apple\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une ex\u00e9cution de code\narbitraire \u00e0 distance.\n\nApple indique que la vuln\u00e9rabilit\u00e9 CVE-2023-41993 est activement\nexploit\u00e9e dans le cadre d \u0027attaques cibl\u00e9es sur des versions d\u0027iOS\nant\u00e9rieures \u00e0 16.7.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213936 du 18 septembre 2023",
"url": "https://support.apple.com/en-us/HT213936"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213939 du 18 septembre 2023",
"url": "https://support.apple.com/en-us/HT213939"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213941 du 26 septembre 2023",
"url": "https://support.apple.com/en-us/HT213941"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213940 du 26 septembre 2023",
"url": "https://support.apple.com/en-us/HT213940"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213937 du 18 septembre 2023",
"url": "https://support.apple.com/en-us/HT213937"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213938 du 18 septembre 2023",
"url": "https://support.apple.com/en-us/HT213938"
}
]
}
GHSA-8HR7-67MJ-F566
Vulnerability from github – Published: 2023-09-27 15:30 – Updated: 2025-11-04 21:30A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to execute arbitrary code with kernel privileges.
{
"affected": [],
"aliases": [
"CVE-2023-41995"
],
"database_specific": {
"cwe_ids": [
"CWE-416"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2023-09-27T15:19:32Z",
"severity": "HIGH"
},
"details": "A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to execute arbitrary code with kernel privileges.",
"id": "GHSA-8hr7-67mj-f566",
"modified": "2025-11-04T21:30:43Z",
"published": "2023-09-27T15:30:37Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41995"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/HT213938"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/HT213940"
},
{
"type": "WEB",
"url": "https://support.apple.com/kb/HT213841"
},
{
"type": "WEB",
"url": "https://support.apple.com/kb/HT213938"
},
{
"type": "WEB",
"url": "https://support.apple.com/kb/HT213940"
},
{
"type": "WEB",
"url": "http://seclists.org/fulldisclosure/2023/Oct/3"
},
{
"type": "WEB",
"url": "http://seclists.org/fulldisclosure/2023/Oct/8"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
GSD-2023-41995
Vulnerability from gsd - Updated: 2023-12-13 01:20{
"GSD": {
"alias": "CVE-2023-41995",
"id": "GSD-2023-41995"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2023-41995"
],
"details": "A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to execute arbitrary code with kernel privileges.",
"id": "GSD-2023-41995",
"modified": "2023-12-13T01:20:45.455705Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2023-41995",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "iOS and iPadOS",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "unspecified",
"version_value": "17"
}
]
}
},
{
"product_name": "macOS",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "unspecified",
"version_value": "14"
}
]
}
}
]
},
"vendor_name": "Apple"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to execute arbitrary code with kernel privileges."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "An app may be able to execute arbitrary code with kernel privileges"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.apple.com/en-us/HT213938",
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT213938"
},
{
"name": "https://support.apple.com/en-us/HT213940",
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT213940"
},
{
"name": "https://support.apple.com/kb/HT213841",
"refsource": "MISC",
"url": "https://support.apple.com/kb/HT213841"
},
{
"name": "http://seclists.org/fulldisclosure/2023/Oct/8",
"refsource": "MISC",
"url": "http://seclists.org/fulldisclosure/2023/Oct/8"
},
{
"name": "http://seclists.org/fulldisclosure/2023/Oct/3",
"refsource": "MISC",
"url": "http://seclists.org/fulldisclosure/2023/Oct/3"
}
]
}
},
"nvd.nist.gov": {
"cve": {
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F362BEC4-90C7-4305-BFF9-645FE6C52DFE",
"versionEndExcluding": "16.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DB63BAC2-C756-428C-8BAC-BAD39FBE5EF4",
"versionEndExcluding": "16.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7A5DD3D5-FB4F-4313-B873-DCED87FC4605",
"versionEndExcluding": "14.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to execute arbitrary code with kernel privileges."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de use-after-free con una gesti\u00f3n de memoria mejorada. Este problema se solucion\u00f3 en iOS 17 y iPadOS 17, macOS Sonoma 14. Es posible que una aplicaci\u00f3n pueda ejecutar c\u00f3digo arbitrario con privilegios del kernel."
}
],
"id": "CVE-2023-41995",
"lastModified": "2023-12-22T16:15:29.073",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-09-27T15:19:32.353",
"references": [
{
"source": "product-security@apple.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2023/Oct/3"
},
{
"source": "product-security@apple.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2023/Oct/8"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213938"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213940"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/kb/HT213841"
}
],
"sourceIdentifier": "product-security@apple.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
}
}
}
FKIE_CVE-2023-41995
Vulnerability from fkie_nvd - Published: 2023-09-27 15:19 - Updated: 2025-11-04 20:16{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F362BEC4-90C7-4305-BFF9-645FE6C52DFE",
"versionEndExcluding": "16.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DB63BAC2-C756-428C-8BAC-BAD39FBE5EF4",
"versionEndExcluding": "16.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7A5DD3D5-FB4F-4313-B873-DCED87FC4605",
"versionEndExcluding": "14.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to execute arbitrary code with kernel privileges."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de use-after-free con una gesti\u00f3n de memoria mejorada. Este problema se solucion\u00f3 en iOS 17 y iPadOS 17, macOS Sonoma 14. Es posible que una aplicaci\u00f3n pueda ejecutar c\u00f3digo arbitrario con privilegios del kernel."
}
],
"id": "CVE-2023-41995",
"lastModified": "2025-11-04T20:16:48.523",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-09-27T15:19:32.353",
"references": [
{
"source": "product-security@apple.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2023/Oct/3"
},
{
"source": "product-security@apple.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2023/Oct/8"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213938"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213940"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/kb/HT213841"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2023/Oct/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2023/Oct/8"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213938"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213940"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/kb/HT213841"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://support.apple.com/kb/HT213938"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://support.apple.com/kb/HT213940"
}
],
"sourceIdentifier": "product-security@apple.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.