First published: Mon Jan 23 2023(Updated: )
The issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.6.3, macOS Ventura 13.2, iOS 16.3 and iPadOS 16.3, tvOS 16.3, watchOS 9.3. An app may be able to bypass Privacy preferences.
Credit: product-security@apple.com product-security@apple.com Wojciech Regula SecuRingAdam M. Wojciech Regula SecuRingAdam M. Wojciech Regula SecuRingAdam M. Wojciech Regula SecuRingAdam M. Wojciech Regula SecuRingAdam M.
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPadOS | <16.3 | |
Apple iPhone OS | <16.3 | |
Apple macOS | >=12.0.0<12.6.3 | |
Apple macOS | >=13.0<13.2 | |
Apple tvOS | <16.3 | |
Apple watchOS | <9.3 | |
<13.2 | 13.2 | |
<16.3 | 16.3 | |
<12.6.3 | 12.6.3 | |
<16.3 | 16.3 | |
<16.3 | 16.3 | |
Apple watchOS | <9.3 | 9.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-23511 is a vulnerability in Apple software that allows an app to bypass Privacy preferences due to improved memory handling.
CVE-2023-23511 has a severity level of medium with a score of 5.5.
CVE-2023-23511 affects macOS Monterey versions up to and including 12.6.3, iOS versions up to and including 16.3, iPadOS versions up to and including 16.3, tvOS versions up to and including 16.3, and watchOS versions up to and including 9.3.
To fix CVE-2023-23511, update your Apple software to the latest versions: macOS Monterey 12.6.3, iOS 16.3 and iPadOS 16.3, tvOS 16.3, and watchOS 9.3.
You can find more information about CVE-2023-23511 on the Apple support page: [link](https://support.apple.com/en-us/HT213599), [link](https://support.apple.com/en-us/HT213601), [link](https://support.apple.com/en-us/HT213604).