First published: Mon Mar 27 2023(Updated: )
An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in tvOS 16.4, iOS 16.4 and iPadOS 16.4. Processing a maliciously crafted Bluetooth packet may result in disclosure of process memory
Credit: product-security@apple.com product-security@apple.com Jianjun Dai 360 Vulnerability Research InstituteGuang Gong 360 Vulnerability Research InstituteJianjun Dai 360 Vulnerability Research InstituteGuang Gong 360 Vulnerability Research Institute
Affected Software | Affected Version | How to fix |
---|---|---|
Apple tvOS | <16.4 | 16.4 |
<16.4 | 16.4 | |
<16.4 | 16.4 | |
Apple iPadOS | <16.4 | |
Apple iPhone OS | <16.4 | |
Apple tvOS | <16.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-23528 is a vulnerability in Core Bluetooth that allows for an out-of-bounds read when processing a maliciously crafted Bluetooth packet, potentially resulting in the disclosure of process memory.
CVE-2023-23528 affects Apple devices running tvOS, iOS, and iPadOS versions up to and including 16.4.
CVE-2023-23528 has a severity rating of 6.5, which is considered medium.
CVE-2023-23528 is fixed in tvOS 16.4, iOS 16.4, and iPadOS 16.4. Update your Apple device to the latest available version to mitigate the vulnerability.
You can find more information about CVE-2023-23528 on the Apple Support website: [https://support.apple.com/en-us/HT213674](https://support.apple.com/en-us/HT213674) and [https://support.apple.com/en-us/HT213676](https://support.apple.com/en-us/HT213676)