First published: Wed Oct 25 2023(Updated: )
IOTextEncryptionFamily. The issue was addressed with improved memory handling.
Credit: an anonymous researcher an anonymous researcher an anonymous researcher an anonymous researcher an anonymous researcher product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS | <16.7.2 | 16.7.2 |
Apple iPadOS | <16.7.2 | 16.7.2 |
Apple iOS | <17.1 | 17.1 |
Apple iPadOS | <17.1 | 17.1 |
<12.7.1 | 12.7.1 | |
Apple macOS Sonoma | <14.1 | 14.1 |
Apple macOS Ventura | <13.6.1 | 13.6.1 |
Apple iPadOS | <16.7.2 | |
Apple iPadOS | >=17.0<17.1 | |
Apple iPhone OS | <16.7.2 | |
Apple iPhone OS | >=17.0<17.1 | |
Apple macOS | >=12.0.0<12.7.1 | |
Apple macOS | >=13.0<13.6.1 | |
Apple macOS | >=14.0<14.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID is CVE-2023-40423.
The title of the vulnerability is IOTextEncryptionFamily.
The vulnerability is fixed in iOS 17.1 and iPadOS 17.1, macOS Monterey 12.7.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Ventura 13.6.1, macOS Sonoma 14.1.
An app may be able to execute arbitrary code with kernel privileges.
You can find more information about this vulnerability on the Apple support website: [https://support.apple.com/en-us/HT213981](https://support.apple.com/en-us/HT213981), [https://support.apple.com/en-us/HT213984](https://support.apple.com/en-us/HT213984), [https://support.apple.com/en-us/HT213985](https://support.apple.com/en-us/HT213985).