First published: Mon Mar 27 2023(Updated: )
Camera. The issue was addressed with additional restrictions on the observability of app states.
Credit: Yiğit Can YILMAZ @yilmazcanyigit Yiğit Can YILMAZ @yilmazcanyigit Yiğit Can YILMAZ @yilmazcanyigit Yiğit Can YILMAZ @yilmazcanyigit product-security@apple.com product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple watchOS | <9.4 | 9.4 |
Apple iOS | <15.7.4 | 15.7.4 |
Apple iPadOS | <15.7.4 | 15.7.4 |
Apple iPadOS | <15.7.4 | |
Apple iPadOS | >=16.0<16.4 | |
Apple iPhone OS | <15.7.4 | |
Apple iPhone OS | >=16.0<16.4 | |
Apple macOS | <13.3 | |
<16.4 | 16.4 | |
<16.4 | 16.4 | |
Apple macOS Ventura | <13.3 | 13.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-23543 is a vulnerability that allows a sandboxed app to determine which app is currently using the camera on Apple devices.
CVE-2023-23543 is fixed in macOS Ventura 13.3, iOS 15.7.4 and iPadOS 15.7.4, iOS 16.4 and iPadOS 16.4, and watchOS 9.4. Update your Apple devices to the mentioned versions to fix the vulnerability.
CVE-2023-23543 has a severity level of low.
Apple devices running iOS, iPadOS, macOS Ventura, watchOS, and iPhone OS versions mentioned in the fix are affected by CVE-2023-23543.
You can find more information about CVE-2023-23543 on the official Apple support page: [CVE-2023-23543](https://support.apple.com/en-us/HT213673).