First published: Mon Jul 24 2023(Updated: )
Kernel. The issue was addressed with improved memory handling.
Credit: Pan ZhenPeng @Peterpan0927 STAR Labs SG PtePeter Nguyễn Vũ Hoàng @peternguyen14 STAR Labs SG Ptean anonymous researcher Certik Skyfall Team Certik Skyfall Team Pan ZhenPeng @Peterpan0927 STAR Labs SG PtePeter Nguyễn Vũ Hoàng @peternguyen14 STAR Labs SG Pte product-security@apple.com product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS | <16.6 | 16.6 |
Apple iPadOS | <16.6 | 16.6 |
<13.5 | 13.5 | |
Apple tvOS | <16.6 | 16.6 |
Apple watchOS | <9.6 | 9.6 |
Apple iPadOS | <16.6 | |
Apple iPhone OS | <16.6 | |
Apple macOS | >=13.0<13.5 | |
Apple tvOS | <16.6 | |
Apple watchOS | <9.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-32734 is a vulnerability in the Kernel that allows an app to execute arbitrary code with kernel privileges.
CVE-2023-32734 is fixed in iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Ventura 13.5, and watchOS 9.6 with improved memory handling.
CVE-2023-32734 has a severity rating of 7.8 (high).
CVE-2023-32734 affects Apple iOS up to version 16.6, Apple iPadOS up to version 16.6, Apple tvOS up to version 16.6, Apple macOS Ventura up to version 13.5, and Apple watchOS up to version 9.6.
You can find more information about CVE-2023-32734 on the Apple support website at the following links: [Link 1](https://support.apple.com/en-us/HT213848), [Link 2](https://support.apple.com/en-us/HT213846), [Link 3](https://support.apple.com/en-us/HT213843).