First published: Mon Sep 18 2023(Updated: )
App Store. The issue was addressed with improved handling of protocols.
Credit: w0wbox w0wbox w0wbox w0wbox w0wbox product-security@apple.com product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPadOS | <16.7 | |
Apple iPhone OS | <16.7 | |
Apple macOS | <14.0 | |
Apple tvOS | <17.0 | |
Apple watchOS | <10.0 | |
Apple iOS | <16.7 | 16.7 |
Apple iPadOS | <16.7 | 16.7 |
Apple macOS Sonoma | <14 | 14 |
<17 | 17 | |
<17 | 17 | |
<17 | 17 | |
Apple watchOS | <10 | 10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID for this issue is CVE-2023-40448.
The affected software includes Apple tvOS up to version 17, Apple iOS up to version 17, Apple iPadOS up to version 17, Apple watchOS up to version 10, and Apple macOS Sonoma up to version 14.
The issue was addressed with improved handling of protocols.
You can find more information about this issue on the following references: [link1](https://support.apple.com/en-us/HT213937), [link2](https://support.apple.com/en-us/HT213936), [link3](https://support.apple.com/en-us/HT213940).