First published: Mon Jan 23 2023(Updated: )
A race condition was addressed with additional validation. This issue is fixed in watchOS 9.3, tvOS 16.3, macOS Ventura 13.2, iOS 16.3 and iPadOS 16.3. A user may be able to read arbitrary files as root.
Credit: Cees Elzinga Cees Elzinga Cees Elzinga Cees Elzinga product-security@apple.com product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPadOS | <16.3 | |
Apple iPhone OS | <16.3 | |
Apple macOS | <13.2 | |
<13.2 | 13.2 | |
<16.3 | 16.3 | |
<16.3 | 16.3 | |
<16.3 | 16.3 | |
Apple watchOS | <9.3 | 9.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID is CVE-2023-23520.
The severity of CVE-2023-23520 is medium with a CVSS score of 5.9.
CVE-2023-23520 affects watchOS versions up to and excluding 9.3, tvOS versions up to and excluding 16.3, macOS Ventura versions up to and excluding 13.2, iOS versions up to and excluding 16.3, and iPadOS versions up to and excluding 16.3.
CVE-2023-23520 was addressed by fixing the race condition with additional validation in watchOS 9.3, tvOS 16.3, macOS Ventura 13.2, iOS 16.3, and iPadOS 16.3.
The impact of CVE-2023-23520 is that a user may be able to read arbitrary files as root.