First published: Mon Sep 18 2023(Updated: )
Airport. A permissions issue was addressed with improved redaction of sensitive information.
Credit: Arsenii Kostromin (0x3c3e) Offensive SecurityJoshua Jewett @JoshJewett33 Offensive Security Offensive SecurityCsaba Fitzl @theevilbit Offensive SecurityCristian Dinca Computer ScienceRomania JeongOhKyea Theori이준성(Junsung Lee) Cross RepublicKirin @Pwnrin NorthSeaWojciech Regula SecuRingHalle Winkler Politepix @hallewinkler Sei K. Mickey Jin @patch1t Noah Roskin-Frazee Professor Jason Lau (ZeroClicks.ai Lab) Noah Roskin-Frazee Offensive SecurityPr Offensive SecurityAntonio Zekic @antoniozekic Dataflow SecurityRon Masas ImpervaMurray Mike Mikko Kenttälä ) @Turmio_ SensorFuYiğit Can YILMAZ @yilmazcanyigit Certik Skyfall Team Certik Skyfall Team Ant Security Light Ant Security Lightpattern-f @pattern_F_ Ant Security LightZweig Kunlun LabLinus Henze Pinauten GmbHPan ZhenPeng @Peterpan0927 STAR Labs SG PteMichael (Biscuit) Thomas 张师傅(@京东蓝军) Joseph Ravichandran @0xjprx MIT CSAILFerdous Saljooki @malwarezoo Jamf Softwarean anonymous researcher Zhipeng Huo @R3dF09 Tencent Security Xuanwu LabDohyun Lee @l33d0hyun PK SecurityAdam M. SecuRing SecuRingAdam M. BreakPoint Security Research BreakPoint Security ResearchRon Masas BreakPoint Security ResearchMeng Zhang (鲸落) NorthSeaBrian McNulty Texts TextsKishan Bagaria TextsMichael DePlante @izobashi Trend Micro Zero Day InitiativeGergely Kalman @gergely_kalman Kirin @Pwnrin baba yaga weize she Berke Kırbaş Harsh Jaiswal Serkan Erayabakan George Mason UniversityDavid Kotval George Mason UniversityAkincibor George Mason UniversitySina Ahmadi George Mason UniversityBilly Tabrizi Kirin @Pwnrin SecuRingTomi Tokics @tomitokics iTomsn0wLuan Herrera @lbherrera_ Adriatik Raci Sentry CybersecurityNarendra Bhati (twitter.com/imnarendrabhati) Suma Soft PvtPune (India) Noah Roskin-Frazee (ZeroClicks.ai Lab) James Duffy (mangoSecure) Ron Masas BreakPointJames Hutchins Thijs Alkemade @xnyhps Computest Sector 7Andrew Haggard Francisco Alonso @revskills PK Security PK SecurityFrancisco Alonso @revskills Jie Ding @Lime HKUS3 LabAjou University Abysslab Dong Jun Kim @smlijun Jong Seong Kim @nevul37 Bill Marczak The Citizen Lab at The University of Toronto's Munk SchoolMaddie Stone Google's Threat Analysis GroupClaire Houston Anonymous Dong Jun Kim @smlijun AbyssLab AbyssLabJong Seong Kim @nevul37 AbyssLabWang Yu CyberservalAn anonymous researcher MacEnhanceJeremy Legendre MacEnhanceFelix Kratz Koh M. Nakagawa @tsunek0h Adam M. Yishu Wang Will Brattain at Trail Bitszer0k Mohamed GHANNAM @_simo36 Tim Michaud @TimGMichaud MoveworksWojciech Reguła @_r3ggi Chris Ross (Zoom) ABC Research s.r.o. w0wbox product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS | <14 | 14 |
Apple iOS, iPadOS, and watchOS | <17 | 17 |
Apple iOS, iPadOS, and watchOS | <17 | 17 |
Apple iOS, iPadOS, and watchOS | <10 | 10 |
Apple iOS, iPadOS, and watchOS | <17.0 | |
iStyle @cosme iPhone OS | <17.0 | |
Apple iOS and macOS | <14.0 | |
Apple iOS, iPadOS, and watchOS | <10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-40424 is a vulnerability in TCC (Transparency, Consent, and Control) that has been addressed by Apple with improved checks.
Apple iOS up to version 17, Apple iPadOS up to version 17, Apple watchOS up to version 10, and Apple macOS Sonoma up to version 14 are affected by CVE-2023-40424.
To fix CVE-2023-40424, you should update your Apple software to the latest version available.
You can find more information about CVE-2023-40424 on the official Apple support website. Here are the references: [Reference 1](https://support.apple.com/en-us/HT213937), [Reference 2](https://support.apple.com/en-us/HT213940), [Reference 3](https://support.apple.com/en-us/HT213938).