First published: Mon Feb 13 2023(Updated: )
A denial-of-service issue was addressed with improved input validation. This issue is fixed in tvOS 16.3.2, iOS 16.3.1 and iPadOS 16.3.1, watchOS 9.3.1, macOS Ventura 13.2.1. Processing a maliciously crafted certificate may lead to a denial-of-service.
Credit: David Benjamin Google ChromeDavid Benjamin Google ChromeDavid Benjamin Google ChromeDavid Benjamin Google Chrome product-security@apple.com product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPadOS | <16.3.1 | |
Apple iPhone OS | <16.3.1 | |
Apple macOS | <13.2.1 | |
Apple tvOS | <16.3.2 | |
Apple watchOS | <9.3.1 | |
Apple tvOS | <16.3.2 | 16.3.2 |
Apple watchOS | <9.3.1 | 9.3.1 |
Apple macOS Ventura | <13.2.1 | 13.2.1 |
Apple iOS | <16.3.1 | 16.3.1 |
Apple iPadOS | <16.3.1 | 16.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-23524 is a denial-of-service issue that has been fixed in tvOS 16.3.2, iOS 16.3.1 and iPadOS 16.3.1, watchOS 9.3.1, and macOS Ventura 13.2.1.
CVE-2023-23524 can be exploited by processing a maliciously crafted certificate, which may lead to a denial-of-service.
CVE-2023-23524 has a severity level of 7.5 (High).
The affected software versions are tvOS up to exclusive version 16.3.2, iOS up to exclusive version 16.3.1, iPadOS up to exclusive version 16.3.1, watchOS up to exclusive version 9.3.1, and macOS Ventura up to exclusive version 13.2.1.
To fix CVE-2023-23524, update your software to tvOS 16.3.2, iOS 16.3.1 and iPadOS 16.3.1, watchOS 9.3.1, or macOS Ventura 13.2.1.