First published: Mon Mar 27 2023(Updated: )
Kernel. The issue was addressed with improved bounds checks.
Credit: Félix Poulin-Bélanger David Pan Ogea Félix Poulin-Bélanger David Pan Ogea Félix Poulin-Bélanger David Pan Ogea Félix Poulin-Bélanger David Pan Ogea Félix Poulin-Bélanger David Pan Ogea Félix Poulin-Bélanger David Pan Ogea Félix Poulin-Bélanger David Pan Ogea product-security@apple.com product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple tvOS | <16.4 | 16.4 |
Apple watchOS | <9.4 | 9.4 |
Apple iOS | <15.7.4 | 15.7.4 |
Apple iPadOS | <15.7.4 | 15.7.4 |
Apple iPadOS | <15.7.4 | |
Apple iPadOS | >=16.0<16.4 | |
Apple iPhone OS | <15.7.4 | |
Apple macOS | <13.3 | |
<12.6.4 | 12.6.4 | |
<16.4 | 16.4 | |
<16.4 | 16.4 | |
<11.7.5 | 11.7.5 | |
Apple macOS Ventura | <13.3 | 13.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
The vulnerability ID is CVE-2023-23536.
The severity rating of CVE-2023-23536 is 7.8 (High).
The affected software versions are Apple iOS up to version 15.7.4, Apple iPadOS up to version 15.7.4, Apple macOS Ventura up to version 13.3, Apple watchOS up to version 15.7.4, Apple macOS Big Sur up to version 11.7.5, Apple iOS up to version 16.4, Apple iPadOS up to version 16.4, Apple watchOS up to version 9.4, and Apple tvOS up to version 16.4.
CVE-2023-23536 was fixed with improved bounds checks in the following software versions: macOS Ventura 13.3, iOS 16.4 and iPadOS 16.4, macOS Big Sur 11.7.5, iOS 15.7.4 and iPadOS 15.7.4, macOS Monterey 12.6.4, tvOS 16.4, and watchOS 9.4.
The potential impact of CVE-2023-23536 is that an app may be able to execute arbitrary code with kernel privileges.