First published: Mon Mar 27 2023(Updated: )
LaunchServices. This issue was addressed with improved checks.
Credit: an anonymous researcher Red CanaryBrandon Dalton @partyD0lphin Red CanaryMilan Tenk F FArthur Valiev Fan anonymous researcher Red CanaryBrandon Dalton @partyD0lphin Red CanaryMilan Tenk F FArthur Valiev F product-security@apple.com product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPadOS | <16.4 | |
Apple iPhone OS | <16.4 | |
Apple macOS | <13.3 | |
<16.4 | 16.4 | |
<16.4 | 16.4 | |
Apple macOS Ventura | <13.3 | 13.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-27943 is a vulnerability in LaunchServices in macOS Ventura, iOS, and iPadOS that allows files downloaded from the internet to not have the quarantine flag applied.
CVE-2023-27943 has a severity rating of 5.5 (medium).
CVE-2023-27943 was addressed with improved checks in macOS Ventura 13.3, iOS 16.4, and iPadOS 16.4.
To fix CVE-2023-27943, update your macOS Ventura to version 13.3 or later, iOS to version 16.4 or later, and iPadOS to version 16.4 or later.
You can find more information about CVE-2023-27943 on the Apple support website: [link](https://support.apple.com/en-us/HT213670) and [link](https://support.apple.com/en-us/HT213676).