First published: Mon Mar 27 2023(Updated: )
Accessibility. A privacy issue was addressed with improved private data redaction for log entries.
Credit: product-security@apple.com Mohamed GHANNAM @_simo36 Mohamed GHANNAM @_simo36 product-security@apple.com Csaba Fitzl @theevilbit Offensive SecurityAdam M. Mohamed GHANNAM @_simo36 Mohamed GHANNAM @_simo36 Mohamed GHANNAM Mohamed Ghannam @_simo36 Mickey Jin @patch1t Mickey Jin @patch1t Rıza Sabuncu @rizasabuncu Yiğit Can YILMAZ @yilmazcanyigit Itay Iellin General Motors Product Cyber SecurityJeongOhKyea Jianjun Dai 360 Vulnerability Research InstituteGuang Gong 360 Vulnerability Research InstituteTingting Yin Tsinghua UniversityMickey Jin @patch1t Adam M. Adam M. Ye Zhang @VAR10CK Baidu SecurityYe Zhang @VAR10CK Baidu Securityan anonymous researcher Jubaer Alnazi TRS Group of CompaniesCsaba Fitzl @theevilbit Offensive Securityryuzaki Meysam Firouzi @R00tkitSMM Mbition Mercedesjzhu Trend Micro Zero Day InitiativeMeysam Firouzi @R00tkitSMM Mbition Mercedesjzhu Trend Micro Zero Day InitiativeMeysam Firouzi @R00tkitSMM Mbition MercedesPan ZhenPeng @Peterpan0927 STAR Labs SG PtePan ZhenPeng STAR Labs SG PteZechao Cai @Zech4o Zhejiang UniversityAdam Doupé ASU SEFCOMsqrtpwn Félix Poulin-Bélanger David Pan Ogea an anonymous researcher Red CanaryBrandon Dalton @partyD0lphin Red CanaryMilan Tenk F FArthur Valiev FMickey Jin @patch1t Zweig Kunlun LabAbhay Kailasia @abhay_kailasia Lakshmi Narain College Of Technology BhopalZhuowei Zhang developStorm Mickey Jin @patch1t Anton Spivak Yiğit Can YILMAZ @yilmazcanyigit Jubaer Alnazi Jabin TRS Group Of Companies Alibaba GroupWenchao Li Alibaba GroupXiaolong Bai Alibaba GroupMickey Jin @patch1t Xin Huang @11iaxH Gertjan Franken imecKU Leuven hazbinhotel Trend Micro Zero Day InitiativeHyeon Park @tree_segment Team ApplePIEGeorgy Kucherin @kucher1n KasperskyLeonid Bezvershenko @bzvr_ KasperskyBoris Larin @oct0xor Kaspersky KasperskyValentin Pashkov Kasperskyan anonymous researcher an anonymous researcher Hyeon Park @tree_segment Team ApplePIEan anonymous researcher Anonymous Trend Micro Zero Day InitiativeDohyun Lee @l33d0hyun SSD Labscrixer @pwning_me SSD LabsMohamed GHANNAM @_simo36 Mohamed GHANNAM @_simo36 Mohamed GHANNAM Mohamed Ghannam @_simo36 Mickey Jin @patch1t Mickey Jin @patch1t Rıza Sabuncu @rizasabuncu Yiğit Can YILMAZ @yilmazcanyigit Itay Iellin General Motors Product Cyber SecurityJeongOhKyea Jianjun Dai 360 Vulnerability Research InstituteGuang Gong 360 Vulnerability Research InstituteTingting Yin Tsinghua UniversityMickey Jin @patch1t Adam M. Adam M. Ye Zhang @VAR10CK Baidu SecurityYe Zhang @VAR10CK Baidu Securityan anonymous researcher Jubaer Alnazi TRS Group of CompaniesCsaba Fitzl @theevilbit Offensive Securityryuzaki Meysam Firouzi @R00tkitSMM Mbition Mercedesjzhu Trend Micro Zero Day InitiativeMeysam Firouzi @R00tkitSMM Mbition Mercedesjzhu Trend Micro Zero Day InitiativeMeysam Firouzi @R00tkitSMM Mbition MercedesPan ZhenPeng @Peterpan0927 STAR Labs SG PtePan ZhenPeng STAR Labs SG PteZechao Cai @Zech4o Zhejiang UniversityAdam Doupé ASU SEFCOMsqrtpwn Félix Poulin-Bélanger David Pan Ogea an anonymous researcher Red CanaryBrandon Dalton @partyD0lphin Red CanaryMilan Tenk F FArthur Valiev FMickey Jin @patch1t Zweig Kunlun LabAbhay Kailasia @abhay_kailasia Lakshmi Narain College Of Technology BhopalZhuowei Zhang developStorm Mickey Jin @patch1t Anton Spivak Yiğit Can YILMAZ @yilmazcanyigit Jubaer Alnazi Jabin TRS Group Of Companies Alibaba GroupWenchao Li Alibaba GroupXiaolong Bai Alibaba GroupMickey Jin @patch1t Xin Huang @11iaxH Gertjan Franken imecKU Leuven hazbinhotel Trend Micro Zero Day InitiativeHyeon Park @tree_segment Team ApplePIEGeorgy Kucherin @kucher1n KasperskyLeonid Bezvershenko @bzvr_ KasperskyBoris Larin @oct0xor Kaspersky KasperskyValentin Pashkov Kasperskyan anonymous researcher an anonymous researcher Hyeon Park @tree_segment Team ApplePIEan anonymous researcher Anonymous Trend Micro Zero Day InitiativeDohyun Lee @l33d0hyun SSD Labscrixer @pwning_me SSD LabsAdam M. Mohamed GHANNAM @_simo36 Mohamed GHANNAM @_simo36 Mohamed GHANNAM Mohamed Ghannam @_simo36 Mickey Jin @patch1t Mickey Jin @patch1t Rıza Sabuncu @rizasabuncu Yiğit Can YILMAZ @yilmazcanyigit Itay Iellin General Motors Product Cyber SecurityJeongOhKyea Jianjun Dai 360 Vulnerability Research InstituteGuang Gong 360 Vulnerability Research InstituteTingting Yin Tsinghua UniversityMickey Jin @patch1t Adam M. Adam M. Ye Zhang @VAR10CK Baidu SecurityYe Zhang @VAR10CK Baidu Securityan anonymous researcher Jubaer Alnazi TRS Group of CompaniesCsaba Fitzl @theevilbit Offensive Securityryuzaki Meysam Firouzi @R00tkitSMM Mbition Mercedesjzhu Trend Micro Zero Day InitiativeMeysam Firouzi @R00tkitSMM Mbition Mercedesjzhu Trend Micro Zero Day InitiativeMeysam Firouzi @R00tkitSMM Mbition MercedesPan ZhenPeng @Peterpan0927 STAR Labs SG PtePan ZhenPeng STAR Labs SG PteZechao Cai @Zech4o Zhejiang UniversityAdam Doupé ASU SEFCOMsqrtpwn Félix Poulin-Bélanger David Pan Ogea an anonymous researcher Red CanaryBrandon Dalton @partyD0lphin Red CanaryMilan Tenk F FArthur Valiev FMickey Jin @patch1t Zweig Kunlun LabAbhay Kailasia @abhay_kailasia Lakshmi Narain College Of Technology BhopalZhuowei Zhang developStorm Mickey Jin @patch1t Anton Spivak Yiğit Can YILMAZ @yilmazcanyigit Jubaer Alnazi Jabin TRS Group Of Companies Alibaba GroupWenchao Li Alibaba GroupXiaolong Bai Alibaba GroupMickey Jin @patch1t Xin Huang @11iaxH Gertjan Franken imecKU Leuven hazbinhotel Trend Micro Zero Day InitiativeHyeon Park @tree_segment Team ApplePIEGeorgy Kucherin @kucher1n KasperskyLeonid Bezvershenko @bzvr_ KasperskyBoris Larin @oct0xor Kaspersky KasperskyValentin Pashkov Kasperskyan anonymous researcher an anonymous researcher Hyeon Park @tree_segment Team ApplePIEan anonymous researcher Anonymous Trend Micro Zero Day InitiativeDohyun Lee @l33d0hyun SSD Labscrixer @pwning_me SSD Labs
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Ipad Os | <16.4 | |
Apple iPhone OS | <16.4 | |
Apple iOS | <16.4 | 16.4 |
Apple iPadOS | <16.4 | 16.4 |
Apple iPadOS | <16.4 | |
<16.4 | 16.4 | |
<16.4 | 16.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The severity of CVE-2023-27959 is high with a score of 7.8.
CVE-2023-27959 allows an app to execute arbitrary code with kernel privileges on affected Apple devices running iOS 16.4 and iPadOS 16.4.
CVE-2023-27959 was fixed through improved memory handling in iOS 16.4 and iPadOS 16.4.
Apple devices running iOS 16.4 and iPadOS 16.4 are affected by CVE-2023-27959.
More information about CVE-2023-27959 can be found on the Apple support website at https://support.apple.com/en-us/HT213676.