First published: Mon Jul 24 2023(Updated: )
Find My. A logic issue was addressed with improved restrictions.
Credit: Wojciech Regula SecuRingWojciech Regula SecuRingWojciech Regula SecuRingWojciech Regula SecuRingWojciech Regula SecuRing product-security@apple.com product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS | <16.6 | 16.6 |
Apple iPadOS | <16.6 | 16.6 |
Apple iOS | <15.7.8 | 15.7.8 |
Apple iPadOS | <15.7.8 | 15.7.8 |
<13.5 | 13.5 | |
<12.6.8 | 12.6.8 | |
Apple watchOS | <9.6 | 9.6 |
Apple iPadOS | <15.7.8 | |
Apple iPadOS | >=16.0<16.6 | |
Apple iPhone OS | <15.7.8 | |
Apple iPhone OS | >=16.0<16.6 | |
Apple macOS | >=12.0.0<12.6.8 | |
Apple macOS | >=13.0<13.5 | |
Apple watchOS | <9.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-32416 is a logic issue addressed with improved restrictions in Apple watchOS, iOS, iPadOS, macOS, and macOS Monterey, which could allow an app to read sensitive location information.
CVE-2023-32416 has a severity rating of 5.5, which is considered medium.
CVE-2023-32416 affects Apple watchOS, iOS, iPadOS, and macOS.
CVE-2023-32416 is fixed in macOS Monterey 12.6.8, iOS 15.7.8 and iPadOS 15.7.8, iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5, and watchOS 9.6. It is recommended to update to the latest available version.
You can find more information about CVE-2023-32416 on the Apple support website at the following links: [Link 1](https://support.apple.com/en-us/HT213848), [Link 2](https://support.apple.com/en-us/HT213843), [Link 3](https://support.apple.com/en-us/HT213844).