First published: Mon Jul 24 2023(Updated: )
Find My. A logic issue was addressed with improved restrictions.
Credit: Wojciech Regula SecuRing product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS, iPadOS, and watchOS | <9.6 | 9.6 |
macOS | <12.6.8 | 12.6.8 |
macOS Ventura | <13.5 | 13.5 |
Apple iOS and iPadOS | <16.6 | 16.6 |
Apple iOS, iPadOS, and macOS | <16.6 | 16.6 |
Apple iOS and iPadOS | <15.7.8 | 15.7.8 |
Apple iOS, iPadOS, and macOS | <15.7.8 | 15.7.8 |
Apple iOS, iPadOS, and macOS | <15.7.8 | |
Apple iOS, iPadOS, and macOS | >=16.0<16.6 | |
iPhone OS | <15.7.8 | |
iPhone OS | >=16.0<16.6 | |
macOS | >=12.0.0<12.6.8 | |
macOS | >=13.0<13.5 | |
Apple iOS, iPadOS, and watchOS | <9.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-32416 is a logic issue addressed with improved restrictions in Apple watchOS, iOS, iPadOS, macOS, and macOS Monterey, which could allow an app to read sensitive location information.
CVE-2023-32416 has a severity rating of 5.5, which is considered medium.
CVE-2023-32416 affects Apple watchOS, iOS, iPadOS, and macOS.
CVE-2023-32416 is fixed in macOS Monterey 12.6.8, iOS 15.7.8 and iPadOS 15.7.8, iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5, and watchOS 9.6. It is recommended to update to the latest available version.
You can find more information about CVE-2023-32416 on the Apple support website at the following links: [Link 1](https://support.apple.com/en-us/HT213848), [Link 2](https://support.apple.com/en-us/HT213843), [Link 3](https://support.apple.com/en-us/HT213844).