First published: Mon Jul 24 2023(Updated: )
This issue was addressed with improved checks. This issue is fixed in Safari 16.6, watchOS 9.6, iOS 15.7.8 and iPadOS 15.7.8, tvOS 16.6, iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5. Processing a document may lead to a cross site scripting attack.
Credit: product-security@apple.com product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS | <16.6 | 16.6 |
Apple iPadOS | <16.6 | 16.6 |
Apple iOS | <15.7.8 | 15.7.8 |
Apple iPadOS | <15.7.8 | 15.7.8 |
<13.5 | 13.5 | |
Apple tvOS | <16.6 | 16.6 |
<16.6 | 16.6 | |
Apple watchOS | <9.6 | 9.6 |
Apple Safari | <16.6 | |
Apple iPadOS | <15.7.8 | |
Apple iPadOS | >=16.0<16.6 | |
Apple iPhone OS | <15.7.8 | |
Apple iPhone OS | >=16.0<16.6 | |
Apple macOS | >=13.0<13.5 | |
Apple tvOS | <16.6 | |
Apple watchOS | <9.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2023-32445 is a vulnerability in WebKit that can be exploited to perform a cross-site scripting attack.
CVE-2023-32445 has a severity rating of 6.1, which is considered medium.
CVE-2023-32445 affects watchOS up to version 9.6, tvOS up to version 16.6, iOS up to version 16.6, macOS Ventura up to version 13.5, iPadOS up to version 16.6, and Safari up to version 16.6.
To fix CVE-2023-32445, update your software to the following versions: Safari 16.6, watchOS 9.6, iOS 15.7.8 and iPadOS 15.7.8, tvOS 16.6, iOS 16.6 and iPadOS 16.6, and macOS Ventura 13.5.
You can find more information about CVE-2023-32445 on the Apple support website: [link](https://support.apple.com/en-us/HT213847).