First published: Mon Mar 27 2023(Updated: )
Podcasts. The issue was addressed with improved checks.
Credit: Mickey Jin @patch1t Mickey Jin @patch1t Mickey Jin @patch1t Mickey Jin @patch1t Mickey Jin @patch1t Mickey Jin @patch1t product-security@apple.com product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPadOS | <16.4 | |
Apple iPhone OS | <16.4 | |
Apple macOS | <12.6.4 | |
Apple macOS | >=13.0<13.3 | |
Apple tvOS | <16.4 | |
Apple watchOS | <9.4 | |
Apple tvOS | <16.4 | 16.4 |
Apple watchOS | <9.4 | 9.4 |
<12.6.4 | 12.6.4 | |
<16.4 | 16.4 | |
<16.4 | 16.4 | |
<11.7.5 | 11.7.5 | |
Apple macOS Ventura | <13.3 | 13.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
The severity of CVE-2023-27942 is medium with a severity value of 5.5.
CVE-2023-27942 was addressed with improved checks.
CVE-2023-27942 is fixed in macOS Ventura 13.3, iOS 16.4 and iPadOS 16.4, macOS Big Sur 11.7.5, macOS Monterey 12.6.4, tvOS 16.4, and watchOS 9.4.
An app may be able to access user-sensitive data due to CVE-2023-27942.
You can find more information about CVE-2023-27942 on the official Apple support page [here](https://support.apple.com/en-us/HT213674).