First published: Thu Jul 20 2017(Updated: )
An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. macOS before 10.12.6 is affected. tvOS before 10.2.2 is affected. watchOS before 3.2.3 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Mobile Safari | <=10.1.1 | |
iStyle @cosme iPhone OS | <=10.3.2 | |
tvOS | <=10.2.1 | |
Apple iCloud for Windows | <=6.2.1 | |
Microsoft Windows | ||
Apple iTunes for Windows | <=12.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7023 is considered to have high severity as it allows attackers to execute arbitrary code in a privileged context.
To fix CVE-2017-7023, update your affected Apple products to the latest version available, specifically iOS 10.3.3, macOS 10.12.6, tvOS 10.2.2, or watchOS 3.2.3.
CVE-2017-7023 affects iOS versions before 10.3.3, macOS versions before 10.12.6, tvOS versions before 10.2.2, and watchOS versions before 3.2.3.
Yes, CVE-2017-7023 can be exploited remotely, allowing attackers to gain unauthorized access to the system.
CVE-2017-7023 involves the Kernel component of the affected Apple products.