First published: Wed Oct 25 2023(Updated: )
Find My. The issue was addressed with improved handling of caches.
Credit: Adam M. Adam M. Adam M. Adam M. Adam M. Adam M. product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS | <16.7.2 | 16.7.2 |
Apple iPadOS | <16.7.2 | 16.7.2 |
Apple iOS | <17.1 | 17.1 |
Apple iPadOS | <17.1 | 17.1 |
<12.7.1 | 12.7.1 | |
Apple macOS Sonoma | <14.1 | 14.1 |
Apple macOS Ventura | <13.6.1 | 13.6.1 |
Apple watchOS | <10.1 | 10.1 |
Apple iPadOS | <16.7.2 | |
Apple iPadOS | >=17.0<17.1 | |
Apple iPhone OS | <16.7.2 | |
Apple iPhone OS | >=17.0<17.1 | |
Apple macOS | >=12.0.0<12.7.1 | |
Apple macOS | >=13.0<13.6.1 | |
Apple macOS | >=14.0<14.1 | |
Apple watchOS | <10.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
The vulnerability ID is CVE-2023-40413.
The title of the vulnerability is 'Find My. The issue was addressed with improved handling of caches.'
The vulnerability allows an app to read sensitive location information and has been fixed in various Apple operating systems.
The affected operating systems are macOS Sonoma 14.1, iOS 16.7.2 and iPadOS 16.7.2, watchOS 10.1, macOS Monterey 12.7.1, and macOS Ventura 13.6.1.
To fix the vulnerability, update your operating system to iOS 17.1 and iPadOS 17.1, macOS Monterey 12.7.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Ventura 13.6.1, or macOS Sonoma 14.1.
You can find more information about this vulnerability on the Apple support website. (Reference: [Link](https://support.apple.com/en-us/HT213981), [Link](https://support.apple.com/en-us/HT213984), [Link](https://support.apple.com/en-us/HT213988))