First published: Mon Dec 11 2023(Updated: )
Accessibility. A privacy issue was addressed with improved private data redaction for log entries.
Credit: Csaba Fitzl @theevilbit Offensive SecurityJoshua Jewett @JoshJewett33 product-security@apple.com Xinru Chi Pangu LabCVE-2024-23225 Koh M. Nakagawa FFRI Security Incan anonymous researcher Meng Zhang (鲸落) NorthSeaMeysam Firouzi @R00tkitsmm Trend Micro Zero Day InitiativeCVE-2024-23283 Bohdan Stasiuk @Bohdan_Stasiuk Mickey Jin @patch1t Pedro Tôrres @t0rr3sp3dr0 Jubaer Alnazi @h33tjubaer Clemens Lang Csaba Fitzl @theevilbit OffSecJunsung Lee Trend Micro Zero Day InitiativeAmir Bazine CrowdStrike Counter Adversary OperationsKarsten König CrowdStrike Counter Adversary OperationsDohyun Lee @l33d0hyun Lyutoon Mr.R Murray Mike Kirin @Pwnrin Brian McNulty m4yfly with TianGong Team Legendsec at Qi'anxin Groupluckyu @uuulucky Noah Roskin-Frazee Pr Ivan Fratric Google Project Zero Trend Micro Zero Day InitiativeMichael DePlante @izobashi Trend Micro Zero Day InitiativeMarc Newlin SkySafeKoh M. Nakagawa @tsunek0h CVE-2023-38545 CVE-2023-38039 CVE-2023-38546 Yann GASCUEL Alter SolutionsAnthony Cruz Tyrant Corp @App Wojciech Regula SecuRingZhenjiang Zhao Pangu TeamQianxin Junsung Lee Meysam Firouzi @R00tkitSMM Pan ZhenPeng @Peterpan0927 STAR Labs SG PteEloi Benoist-Vanderbeken @elvanderb SynacktivCVE-2023-42893 CVE-2023-3618 CVE-2020-19185 CVE-2020-19186 CVE-2020-19187 CVE-2020-19188 CVE-2020-19189 CVE-2020-19190 Ron Masas BreakPointArsenii Kostromin (0x3c3e) Mattie Behrens Zhongquan Li @Guluisacat Zhongquan Li @Guluisacat Dawn Security Lab of JingDongCVE-2023-5344 Pwn2car Zoom Offensive Security Team Nan Wang @eternalsakura13 360 Vulnerability Research Instituterushikesh nandedkar SungKwon Lee (Demon.Team) Don Clarke
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS Monterey | <12.7.4 | 12.7.4 |
Apple macOS | <12.7.4 | |
Apple macOS | >=13.0<13.6.5 | |
Apple macOS | <14.2 | 14.2 |
Apple macOS | <13.6.5 | 13.6.5 |
watchOS | <10.2 | 10.2 |
tvOS | <17.2 | 17.2 |
Apple iOS | <17.2 | 17.2 |
iPadOS | <17.2 | 17.2 |
<12.7.4 | 12.7.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2023-40389 has been categorized with a critical severity due to its potential impact on sensitive data handling.
To mitigate CVE-2023-40389, users should update their affected Apple products to the specified patched versions.
CVE-2023-40389 affects several Apple products, including various versions of macOS, watchOS, iOS, iPadOS, and tvOS.
CVE-2023-40389 addresses logic issues and redaction of sensitive information among others.
No specific workaround for CVE-2023-40389 has been provided, so applying the update is strongly recommended.