First published: Thu May 18 2023(Updated: )
Apple iOS, iPadOS, macOS, tvOS, watchOS, and Safari WebKit contain an unspecified vulnerability that can allow a remote attacker to break out of the Web Content sandbox.
Credit: product-security@apple.com product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS | <16.5 | 16.5 |
Apple iPadOS | <16.5 | 16.5 |
<13.4 | 13.4 | |
Apple tvOS | <16.5 | 16.5 |
<16.5 | 16.5 | |
Apple watchOS | <9.5 | 9.5 |
Apple iOS | <15.7.8 | 15.7.8 |
Apple iPadOS | <15.7.8 | 15.7.8 |
Apple Multiple Products | ||
Apple Safari | <16.5 | |
Apple iPadOS | >=16.0<16.5 | |
Apple iPhone OS | >=16.0<16.5 | |
Apple macOS | >=13.0<13.4 | |
Apple tvOS | <16.5 | |
Apple watchOS | <9.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
The vulnerability ID for this issue is CVE-2023-32409.
The severity of CVE-2023-32409 is high (8.6).
The products affected by CVE-2023-32409 are Apple iOS (up to version 15.7.8), Apple iPadOS (up to version 15.7.8), Apple Safari (up to version 16.5), Apple macOS Ventura (up to version 13.4), and Apple tvOS (up to version 16.5).
Yes, the issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.8 and iPadOS 15.7.8, Safari 16.5, iOS 16.5 and iPadOS 16.5.
You can find more information about CVE-2023-32409 on the Apple support website: [link](https://support.apple.com/HT213757), [link](https://support.apple.com/HT213758), [link](https://support.apple.com/HT213761).