First published: Mon Jul 24 2023(Updated: )
A race condition was addressed with improved state handling. This issue is fixed in macOS Ventura 13.5. An app may be able to execute arbitrary code with kernel privileges.
Credit: ABC Research s.r.o. product-security@apple.com product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
<13.5 | 13.5 | |
Apple macOS | <13.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The severity of CVE-2023-38616 is high.
CVE-2023-38616 allows an app to execute arbitrary code with kernel privileges on macOS Ventura 13.5.
Yes, CVE-2023-38616 is fixed in macOS Ventura 13.5.
To fix CVE-2023-38616, update your macOS Ventura to version 13.5 or higher.
The Common Weakness Enumeration (CWE) for CVE-2023-38616 is CWE-362.