First published: Mon Jul 24 2023(Updated: )
Kernel. The issue was addressed with improved memory handling.
Credit: Pan ZhenPeng @Peterpan0927 STAR Labs SG PtePeter Nguyễn Vũ Hoàng @peternguyen14 STAR Labs SG Ptean anonymous researcher Certik Skyfall Team Certik Skyfall Team Pan ZhenPeng @Peterpan0927 STAR Labs SG PtePeter Nguyễn Vũ Hoàng @peternguyen14 STAR Labs SG Ptean anonymous researcher Certik Skyfall Team Certik Skyfall Team product-security@apple.com product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS | <16.6 | 16.6 |
Apple iPadOS | <16.6 | 16.6 |
<13.5 | 13.5 | |
Apple iPadOS | <16.6 | |
Apple iPhone OS | <16.6 | |
Apple macOS | >=13.0<13.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-38424 is a vulnerability in the kernel that allows an app to execute arbitrary code with kernel privileges.
CVE-2023-38424 affects iOS versions up to 16.6, iPadOS versions up to 16.6, and macOS Ventura versions up to 13.5.
CVE-2023-38424 has a severity rating of 7.8 (high).
CVE-2023-38424 was addressed with improved memory handling in iOS 16.6, iPadOS 16.6, and macOS Ventura 13.5.
You can find more information about CVE-2023-38424 on the Apple support website: [link](https://support.apple.com/en-us/HT213843) and [link](https://support.apple.com/en-us/HT213841).