First published: Mon Feb 13 2023(Updated: )
A use after free issue was addressed with improved memory management. This issue is fixed in macOS Ventura 13.3, macOS Monterey 12.6.4, iOS 16.3.1 and iPadOS 16.3.1, macOS Ventura 13.2.1, macOS Big Sur 11.7.5. An app may be able to execute arbitrary code with kernel privileges.
Credit: Xinru Chi Pangu LabNed Williamson Google Project ZeroXinru Chi Pangu LabNed Williamson Google Project ZeroXinru Chi Pangu LabNed Williamson Google Project ZeroAdam Doupé ASU SEFCOMXinru Chi Pangu LabNed Williamson Google Project ZeroXinru Chi Pangu LabNed Williamson Google Project Zero product-security@apple.com product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS Ventura | <13.2.1 | 13.2.1 |
Apple iOS | <16.3.1 | 16.3.1 |
Apple iPadOS | <16.3.1 | 16.3.1 |
Apple iPadOS | <16.3.1 | |
Apple iPhone OS | <16.3.1 | |
Apple macOS | >=13.0<13.2.1 | |
<12.6.4 | 12.6.4 | |
<11.7.5 | 11.7.5 | |
Apple macOS Ventura | <13.3 | 13.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-23514 is a vulnerability related to a use after free issue in the kernel of Apple devices.
The severity of CVE-2023-23514 is high, with a base score of 7.8.
CVE-2023-23514 affects macOS Ventura (up to version 13.3), macOS Monterey (up to version 12.6.4), iOS (up to version 16.3.1), and iPadOS (up to version 16.3.1).
CVE-2023-23514 is fixed in macOS Ventura 13.3, macOS Monterey 12.6.4, iOS 16.3.1, and iPadOS 16.3.1.
If CVE-2023-23514 is exploited, an app may be able to execute arbitrary code with kernel privileges.