First published: Mon Mar 27 2023(Updated: )
Archive Utility. The issue was addressed with improved checks.
Credit: product-security@apple.com product-security@apple.com Brandon Dalton @partyD0lphin Red CanaryCsaba Fitzl @theevilbit Offensive SecurityBrandon Dalton @partyD0lphin Red CanaryChan Shue Long Offensive Security Offensive SecurityCsaba Fitzl @theevilbit Offensive SecurityBrandon Dalton @partyD0lphin Red CanaryCsaba Fitzl @theevilbit Offensive Security
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS | <11.7.5 | |
Apple macOS | >=12.0<12.6.4 | |
Apple macOS | >=13.0<13.3 | |
<12.6.4 | 12.6.4 | |
<11.7.5 | 11.7.5 | |
Apple macOS Ventura | <13.3 | 13.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID of this issue is CVE-2023-27951.
The severity level of CVE-2023-27951 is medium.
The vulnerability can be exploited through an archive that may be able to bypass Gatekeeper.
CVE-2023-27951 affects macOS Ventura up to version 13.3, macOS Monterey up to version 12.6.4, and macOS Big Sur up to version 11.7.5.
CVE-2023-27951 was addressed with improved checks in macOS Ventura 13.3, macOS Monterey 12.6.4, and macOS Big Sur 11.7.5.