First published: Mon Sep 18 2023(Updated: )
Airport. A permissions issue was addressed with improved redaction of sensitive information.
Credit: Chris Ross (Zoom) product-security@apple.com Mohamed GHANNAM @_simo36 Tim Michaud @TimGMichaud MoveworksMickey Jin @patch1t Wojciech Reguła @_r3ggi Kirin @Pwnrin Csaba Fitzl @theevilbit Offensive Securityzer0k Yiğit Can YILMAZ @yilmazcanyigit Koh M. Nakagawa @tsunek0h Adam M. Noah Roskin-Frazee Professor Jason Lau (ZeroClicks.ai Lab) Yishu Wang Will Brattain at Trail BitsCristian Dinca Computer ScienceRomania JeongOhKyea Theori이준성(Junsung Lee) Cross RepublicKirin @Pwnrin NorthSeaWojciech Regula SecuRingHalle Winkler Politepix @hallewinkler Sei K. Noah Roskin-Frazee Offensive SecurityPr Offensive Security Offensive SecurityAntonio Zekic @antoniozekic Dataflow SecurityRon Masas ImpervaMurray Mike Mikko Kenttälä ) @Turmio_ SensorFuCertik Skyfall Team Certik Skyfall Team Ant Security Light Ant Security Lightpattern-f @pattern_F_ Ant Security LightZweig Kunlun LabLinus Henze Pinauten GmbHPan ZhenPeng @Peterpan0927 STAR Labs SG PteMichael (Biscuit) Thomas 张师傅(@京东蓝军) Joseph Ravichandran @0xjprx MIT CSAILFerdous Saljooki @malwarezoo Jamf Softwarean anonymous researcher Zhipeng Huo @R3dF09 Tencent Security Xuanwu LabDohyun Lee @l33d0hyun PK SecurityAdam M. SecuRing SecuRingAdam M. BreakPoint Security Research BreakPoint Security ResearchRon Masas BreakPoint Security ResearchMeng Zhang (鲸落) NorthSeaBrian McNulty Texts TextsKishan Bagaria TextsMichael DePlante @izobashi Trend Micro Zero Day InitiativeGergely Kalman @gergely_kalman baba yaga weize she Berke Kırbaş Harsh Jaiswal Serkan Erayabakan George Mason UniversityDavid Kotval George Mason UniversityAkincibor George Mason UniversitySina Ahmadi George Mason UniversityBilly Tabrizi Kirin @Pwnrin SecuRingTomi Tokics @tomitokics iTomsn0wLuan Herrera @lbherrera_ Adriatik Raci Sentry CybersecurityNarendra Bhati (twitter.com/imnarendrabhati) Suma Soft PvtPune (India) Noah Roskin-Frazee (ZeroClicks.ai Lab) James Duffy (mangoSecure) Ron Masas BreakPointJames Hutchins Thijs Alkemade @xnyhps Computest Sector 7Andrew Haggard Arsenii Kostromin (0x3c3e) Offensive SecurityJoshua Jewett @JoshJewett33 Offensive SecurityFrancisco Alonso @revskills PK Security PK SecurityFrancisco Alonso @revskills Jie Ding @Lime HKUS3 LabAjou University Abysslab Dong Jun Kim @smlijun Jong Seong Kim @nevul37 Bill Marczak The Citizen Lab at The University of Toronto's Munk SchoolMaddie Stone Google's Threat Analysis GroupClaire Houston Anonymous Dong Jun Kim @smlijun AbyssLab AbyssLabJong Seong Kim @nevul37 AbyssLabWang Yu CyberservalAn anonymous researcher MacEnhanceJeremy Legendre MacEnhanceFelix Kratz ABC Research s.r.o. w0wbox
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS Monterey | <12.7 | 12.7 |
Apple macOS | <14 | 14 |
Apple macOS | <13.6 | 13.6 |
Apple iOS | <16.7 | 16.7 |
iPadOS | <16.7 | 16.7 |
Apple iOS | <17 | 17 |
iPadOS | <17 | 17 |
iPadOS | <16.7 | |
Apple iPhone OS | <16.7 | |
Apple macOS | <12.7 | |
Apple macOS | >=13.0<13.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2023-38612 is considered a high-severity vulnerability due to its potential to expose sensitive information.
To fix CVE-2023-38612, update your Apple macOS Monterey to version 12.7, macOS Ventura to version 13.6, or upgrade to macOS Sonoma version 14.
CVE-2023-38612 affects multiple Apple products including macOS Monterey, iOS, iPadOS, and macOS Ventura.
CVE-2023-38612 is a permissions issue that also addresses buffer overflow vulnerabilities.
Yes, CVE-2023-38612 primarily affects Apple devices running older versions of macOS Monterey, iOS, and iPadOS, up to specific versions.