First published: Mon Jul 24 2023(Updated: )
libxpc. A logic issue was addressed with improved checks.
Credit: Noah Roskin-Frazee Noah Roskin-Frazee Noah Roskin-Frazee Noah Roskin-Frazee Noah Roskin-Frazee Noah Roskin-Frazee Noah Roskin-Frazee product-security@apple.com product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS | <16.6 | 16.6 |
Apple iPadOS | <16.6 | 16.6 |
Apple iOS | <15.7.8 | 15.7.8 |
Apple iPadOS | <15.7.8 | 15.7.8 |
<13.5 | 13.5 | |
<12.6.8 | 12.6.8 | |
Apple macOS Big Sur | <11.7.9 | 11.7.9 |
Apple tvOS | <16.6 | 16.6 |
Apple watchOS | <9.6 | 9.6 |
Apple iPadOS | <15.7.8 | |
Apple iPadOS | >=16.0<16.6 | |
Apple iPhone OS | <15.7.8 | |
Apple iPhone OS | >=16.0<16.6 | |
Apple macOS | <11.7.9 | |
Apple macOS | >=12.0<12.6.8 | |
Apple macOS | >=13.0<13.5 | |
Apple tvOS | <16.6 | |
Apple watchOS | <9.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2023-38593 refers to a logic issue in libxpc that has been fixed in various Apple software versions.
The severity of CVE-2023-38593 is medium with a CVSSv3 score of 5.5.
An app can cause a denial-of-service by exploiting the logic issue in libxpc.
CVE-2023-38593 affects various versions of macOS Monterey, iOS, iPadOS, macOS Big Sur, tvOS, and watchOS.
To fix CVE-2023-38593, update your Apple software to the versions mentioned in the Apple support articles.