First published: Mon Jan 23 2023(Updated: )
TCC. This issue was addressed by removing the vulnerable code.
Credit: Mickey Jin @patch1t Mickey Jin @patch1t Mickey Jin @patch1t Mickey Jin @patch1t Mickey Jin @patch1t Mickey Jin @patch1t product-security@apple.com product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPadOS | <16.4 | |
Apple iPhone OS | <16.4 | |
Apple macOS | <13.3 | |
Apple tvOS | <16.4 | |
Apple watchOS | <9.4 | |
Apple tvOS | <16.4 | 16.4 |
Apple watchOS | <9.4 | 9.4 |
Apple macOS Big Sur | <11.7.3 | 11.7.3 |
Apple macOS Monterey | <12.6.3 | 12.6.3 |
<16.4 | 16.4 | |
<16.4 | 16.4 | |
Apple macOS Ventura | <13.3 | 13.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2023-27931 is a vulnerability that allows an app to access user-sensitive data on certain Apple devices.
CVE-2023-27931 has a severity rating of 5.5 (medium).
Apple devices running macOS Ventura 13.3, macOS Monterey 12.6.3, iOS 16.4, iPadOS 16.4, macOS Big Sur 11.7.3, tvOS 16.4, watchOS 9.4, and older versions are affected.
CVE-2023-27931 has been fixed in macOS Ventura 13.3, macOS Monterey 12.6.3, iOS 16.4, iPadOS 16.4, macOS Big Sur 11.7.3, tvOS 16.4, and watchOS 9.4. Update your device to the latest version to fix the vulnerability.
You can find more information about CVE-2023-27931 on the Apple support website. Check the references for more details.