First published: Thu May 18 2023(Updated: )
NSURLSession. The issue was addressed with improvements to the file handling protocol.
Credit: Thijs Alkemade Computest Sector 7Thijs Alkemade Computest Sector 7Thijs Alkemade Computest Sector 7Thijs Alkemade Computest Sector 7Thijs Alkemade Computest Sector 7 product-security@apple.com product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS | <16.5 | 16.5 |
Apple iPadOS | <16.5 | 16.5 |
<13.4 | 13.4 | |
Apple tvOS | <16.5 | 16.5 |
Apple watchOS | <9.5 | 9.5 |
Apple iPadOS | <16.6 | |
Apple iPhone OS | <16.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-32437 is a vulnerability in NSURLSession that allows an app to break out of its sandbox in iOS 16.6 and iPadOS 16.6.
CVE-2023-32437 affects Apple products such as iOS, iPadOS, iPhone OS, tvOS, watchOS, and macOS Ventura.
The severity of CVE-2023-32437 is high, with a severity value of 8.6.
To fix CVE-2023-32437, update your iOS or iPadOS device to version 16.6 or higher.
You can find more information about CVE-2023-32437 on the Apple support website.