First published: Mon Mar 27 2023(Updated: )
Kernel. The issue was addressed with improved memory handling.
Credit: sqrtpwn sqrtpwn sqrtpwn sqrtpwn sqrtpwn product-security@apple.com product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPadOS | <16.4 | |
Apple iPhone OS | <16.4 | |
Apple macOS | <12.6.4 | |
Apple macOS | >=13.0<13.3 | |
Apple tvOS | <16.4 | |
Apple watchOS | <9.4 | |
Apple tvOS | <16.4 | 16.4 |
Apple watchOS | <9.4 | 9.4 |
<12.6.4 | 12.6.4 | |
<16.4 | 16.4 | |
<16.4 | 16.4 | |
Apple macOS Ventura | <13.3 | 13.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-27933 is a vulnerability in the kernel of Apple's operating systems that allows an app with root privileges to execute arbitrary code with kernel privileges.
CVE-2023-27933 affects Apple watchOS up to version 9.4, Apple tvOS up to version 16.4, Apple iOS up to version 16.4, Apple iPadOS up to version 16.4, and Apple macOS Monterey up to version 12.6.4.
CVE-2023-27933 has a severity rating of medium, with a severity value of 6.7.
CVE-2023-27933 was fixed in macOS Ventura 13.3, iOS 16.4 and iPadOS 16.4, macOS Monterey 12.6.4, tvOS 16.4, and watchOS 9.4 through improved memory handling.
You can find more information about CVE-2023-27933 on the Apple support page: [link](https://support.apple.com/en-us/HT213674) [link](https://support.apple.com/en-us/HT213670) [link](https://support.apple.com/en-us/HT213678).