First published: Mon Jan 23 2023(Updated: )
A logic issue was addressed with improved state management. This issue is fixed in macOS Ventura 13.2, iOS 16.3 and iPadOS 16.3, iOS 15.7.3 and iPadOS 15.7.3, tvOS 16.3, watchOS 9.3. An app may be able to bypass Privacy preferences.
Credit: product-security@apple.com product-security@apple.com Adam M. Adam M. Adam M. Adam M. Adam M.
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPadOS | <15.7.3 | |
Apple iPadOS | >=16.0<16.3 | |
Apple iPhone OS | <15.7.3 | |
Apple iPhone OS | >=16.0<16.3 | |
Apple macOS | <13.2 | |
Apple tvOS | <16.3 | |
Apple watchOS | <9.3 | |
<13.2 | 13.2 | |
<16.3 | 16.3 | |
<16.3 | 16.3 | |
<16.3 | 16.3 | |
<15.7.3 | 15.7.3 | |
<15.7.3 | 15.7.3 | |
Apple watchOS | <9.3 | 9.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID for this issue is CVE-2023-23503.
The severity rating for CVE-2023-23503 is medium (5.5).
CVE-2023-23503 is a logic issue that was addressed with improved state management. An app may be able to bypass Privacy preferences.
iOS versions 15.7.3 and earlier, iPadOS versions 15.7.3 and earlier, tvOS versions up to 16.3, macOS Ventura versions up to 13.2, and watchOS versions up to 9.3 are affected by CVE-2023-23503.
To fix CVE-2023-23503, update your device to macOS Ventura 13.2, iOS 16.3 and iPadOS 16.3, iOS 15.7.3 and iPadOS 15.7.3, tvOS 16.3, or watchOS 9.3.