First published: Mon Mar 27 2023(Updated: )
AppleMobileFileIntegrity. The issue was addressed with improved checks.
Credit: Mickey Jin @patch1t Mickey Jin @patch1t Mickey Jin @patch1t Mickey Jin @patch1t Mickey Jin @patch1t Mickey Jin @patch1t product-security@apple.com product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPadOS | <16.4 | |
Apple iPhone OS | <16.4 | |
Apple macOS | <11.7.5 | |
Apple macOS | >=12.0<12.6.4 | |
Apple macOS | >=13.0<13.3 | |
Apple tvOS | <16.4 | |
Apple watchOS | <9.4 | |
Apple watchOS | <9.4 | 9.4 |
Apple tvOS | <16.4 | 16.4 |
<12.6.4 | 12.6.4 | |
<16.4 | 16.4 | |
<16.4 | 16.4 | |
<11.7.5 | 11.7.5 | |
Apple macOS Ventura | <13.3 | 13.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2023-23527 is a vulnerability in AppleMobileFileIntegrity that could allow a user to gain access to protected parts of the file system.
The severity of CVE-2023-23527 is medium, with a severity value of 5.5.
macOS Big Sur 11.7.5, watchOS 9.4, tvOS 16.4, iOS 16.4, iPadOS 16.4, macOS Monterey 12.6.4, and macOS Ventura 13.3 are affected by CVE-2023-23527.
CVE-2023-23527 was addressed with improved checks in the following software versions: macOS Ventura 13.3, iOS 16.4 and iPadOS 16.4, macOS Big Sur 11.7.5, macOS Monterey 12.6.4, tvOS 16.4, and watchOS 9.4.
You can find more information about CVE-2023-23527 at the following references: [link 1](https://support.apple.com/en-us/HT213674), [link 2](https://support.apple.com/en-us/HT213675), [link 3](https://support.apple.com/en-us/HT213670).