First published: Mon Jul 24 2023(Updated: )
An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 15.7.8 and iPadOS 15.7.8, macOS Big Sur 11.7.9, macOS Monterey 12.6.8, macOS Ventura 13.5. An app may be able to execute arbitrary code with kernel privileges.
Credit: Arsenii Kostromin (0x3c3e) product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS | <11.7.9 | 11.7.9 |
macOS | <12.6.8 | 12.6.8 |
macOS Ventura | <13.5 | 13.5 |
Apple iOS and iPadOS | <15.7.8 | 15.7.8 |
Apple iOS, iPadOS, and macOS | <15.7.8 | 15.7.8 |
Apple iOS, iPadOS, and macOS | <15.7.8 | |
iPhone OS | <15.7.8 | |
macOS | <11.7.9 | |
macOS | >=12.0<12.6.8 | |
macOS | >=13.0<13.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-37285 is a vulnerability in the Kernel that allows an app to execute arbitrary code with kernel privileges.
CVE-2023-37285 has a severity rating of critical (9.8 out of 10).
CVE-2023-37285 affects iOS 15.7.8 and iPadOS 15.7.8, macOS Big Sur 11.7.9, macOS Monterey 12.6.8, and macOS Ventura 13.5.
An app can exploit CVE-2023-37285 by executing arbitrary code with kernel privileges.
To fix CVE-2023-37285, update to iOS 15.7.8 and iPadOS 15.7.8, macOS Big Sur 11.7.9, macOS Monterey 12.6.8, or macOS Ventura 13.5.