First published: Mon Jan 23 2023(Updated: )
The issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.6.3, macOS Ventura 13.2, watchOS 9.3, macOS Big Sur 11.7.3, Safari 16.3, tvOS 16.3, iOS 16.3 and iPadOS 16.3. Processing maliciously crafted web content may lead to arbitrary code execution.
Credit: product-security@apple.com product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Safari | <16.3 | 16.3 |
Apple Safari | <16.3 | |
Apple iPadOS | <16.3 | |
Apple iPhone OS | <16.3 | |
Apple macOS | <11.7.3 | |
Apple macOS | >=12.0<12.6.3 | |
Apple macOS | >=13.0<13.2 | |
Apple tvOS | <16.3 | |
Apple watchOS | <9.3 | |
Apple macOS Big Sur | <11.7.3 | 11.7.3 |
<13.2 | 13.2 | |
<16.3 | 16.3 | |
<12.6.3 | 12.6.3 | |
<16.3 | 16.3 | |
<16.3 | 16.3 | |
Apple watchOS | <9.3 | 9.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
The vulnerability ID for this issue is CVE-2023-23518.
The severity of CVE-2023-23518 is high with a CVSS score of 8.8.
The affected software versions are Apple Safari 16.3, Apple macOS Big Sur 11.7.3, and Apple macOS Monterey 12.6.3.
To fix CVE-2023-23518, update to the fixed versions: macOS Monterey 12.6.3, macOS Ventura 13.2, watchOS 9.3, macOS Big Sur 11.7.3, Safari 16.3, tvOS 16.3, iOS 16.3, and iPadOS 16.3.
CVE-2023-23518 may lead to arbitrary code execution when processing maliciously crafted web content.