First published: Mon Jul 24 2023(Updated: )
An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 15.7.8 and iPadOS 15.7.8, macOS Big Sur 11.7.9, macOS Monterey 12.6.8, macOS Ventura 13.5. An app may be able to execute arbitrary code with kernel privileges.
Credit: Arsenii Kostromin (0x3c3e) Arsenii Kostromin (0x3c3e) Arsenii Kostromin (0x3c3e) Arsenii Kostromin (0x3c3e) product-security@apple.com product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS | <15.7.8 | 15.7.8 |
Apple iPadOS | <15.7.8 | 15.7.8 |
<13.5 | 13.5 | |
<12.6.8 | 12.6.8 | |
Apple macOS Big Sur | <11.7.9 | 11.7.9 |
Apple iPadOS | <15.7.8 | |
Apple iPhone OS | <15.7.8 | |
Apple macOS | <11.7.9 | |
Apple macOS | >=12.0<12.6.8 | |
Apple macOS | >=13.0<13.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-37285 is a vulnerability in the Kernel that allows an app to execute arbitrary code with kernel privileges.
CVE-2023-37285 has a severity rating of critical (9.8 out of 10).
CVE-2023-37285 affects iOS 15.7.8 and iPadOS 15.7.8, macOS Big Sur 11.7.9, macOS Monterey 12.6.8, and macOS Ventura 13.5.
An app can exploit CVE-2023-37285 by executing arbitrary code with kernel privileges.
To fix CVE-2023-37285, update to iOS 15.7.8 and iPadOS 15.7.8, macOS Big Sur 11.7.9, macOS Monterey 12.6.8, or macOS Ventura 13.5.