First published: Mon Jul 24 2023(Updated: )
Kernel. A use-after-free issue was addressed with improved memory management.
Credit: an anonymous researcher Zweig Kunlun LabKaitao Xie Alibaba GroupXiaolong Bai Alibaba GroupCertik Skyfall Team Ant Security Lightpattern-f @pattern_F_ Ant Security LightMohamed GHANNAM @_simo36 product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS Monterey | <12.6.8 | 12.6.8 |
Apple macOS | <11.7.9 | 11.7.9 |
Apple macOS | <13.5 | 13.5 |
watchOS | <9.6 | 9.6 |
tvOS | <16.6 | 16.6 |
Apple iOS | <16.6 | 16.6 |
iPadOS | <16.6 | 16.6 |
Apple iOS | <15.7.8 | 15.7.8 |
iPadOS | <15.7.8 | 15.7.8 |
iPadOS | <15.7.8 | |
iPadOS | >=16.0<16.6 | |
Apple iPhone OS | <15.7.8 | |
Apple iPhone OS | >=16.0<16.6 | |
Apple macOS | >=11.0<11.7.9 | |
Apple macOS | >=12.0.0<12.6.8 | |
Apple macOS | >=13.0<13.5 | |
tvOS | <16.6 | |
watchOS | <9.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2023-35993 is a use-after-free vulnerability in the kernel of Apple devices.
CVE-2023-35993 has a severity rating of 7.8 (high).
CVE-2023-35993 affects macOS Monterey 12.6.8, iOS 15.7.8 and iPadOS 15.7.8, iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Big Sur 11.7.9, macOS Ventura 13.5, and watchOS 9.6.
To fix CVE-2023-35993, you should update your Apple devices to the respective fixed versions listed in the Apple support articles.
You can find more information about CVE-2023-35993 on the Apple support articles: [link1], [link2], [link3].