First published: Mon Sep 18 2023(Updated: )
TCC. The issue was addressed with improved checks.
Credit: product-security@apple.com product-security@apple.com Arsenii Kostromin (0x3c3e) Offensive SecurityJoshua Jewett @JoshJewett33 Offensive Security Offensive SecurityCsaba Fitzl @theevilbit Offensive SecurityArsenii Kostromin (0x3c3e) Offensive SecurityJoshua Jewett @JoshJewett33 Offensive Security Offensive SecurityCsaba Fitzl @theevilbit Offensive SecurityArsenii Kostromin (0x3c3e) Offensive SecurityJoshua Jewett @JoshJewett33 Offensive Security Offensive SecurityCsaba Fitzl @theevilbit Offensive Security
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPadOS | <17.0 | |
Apple iPhone OS | <17.0 | |
Apple macOS | <14.0 | |
Apple watchOS | <10.0 | |
Apple macOS Sonoma | <14 | 14 |
<17 | 17 | |
<17 | 17 | |
Apple watchOS | <10 | 10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-40424 is a vulnerability in TCC (Transparency, Consent, and Control) that has been addressed by Apple with improved checks.
Apple iOS up to version 17, Apple iPadOS up to version 17, Apple watchOS up to version 10, and Apple macOS Sonoma up to version 14 are affected by CVE-2023-40424.
To fix CVE-2023-40424, you should update your Apple software to the latest version available.
You can find more information about CVE-2023-40424 on the official Apple support website. Here are the references: [Reference 1](https://support.apple.com/en-us/HT213937), [Reference 2](https://support.apple.com/en-us/HT213940), [Reference 3](https://support.apple.com/en-us/HT213938).