First published: Mon Feb 01 2016(Updated: )
WebKit, as used in Apple iOS before 9.2.1 and Safari before 9.0.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2016-1725 and CVE-2016-1726.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Mobile Safari | <=9.0.2 | |
iOS | <=9.2 | |
Apple iOS, iPadOS, and watchOS | <=2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1723 has a high severity level due to the potential for remote code execution and denial of service.
To fix CVE-2016-1723, update Safari or iOS to the latest available version that mitigates this vulnerability.
CVE-2016-1723 affects Apple iOS versions before 9.2.1, Safari versions before 9.0.3, and watchOS versions before 2.2.
CVE-2016-1723 can be exploited by remote attackers through a crafted website, leading to arbitrary code execution.
There are no effective workarounds for CVE-2016-1723; updating to a patched version is required for remediation.