First published: Mon Sep 18 2023(Updated: )
A type confusion issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14, iOS 17 and iPadOS 17. A remote user may be able to cause kernel code execution.
Credit: Joseph Ravichandran @0xjprx MIT CSAIL product-security@apple.com Cristian Dinca Computer ScienceRomania JeongOhKyea Theori이준성(Junsung Lee) Cross RepublicKirin @Pwnrin NorthSeaWojciech Regula SecuRingHalle Winkler Politepix @hallewinkler Sei K. Mickey Jin @patch1t Noah Roskin-Frazee Professor Jason Lau (ZeroClicks.ai Lab) Noah Roskin-Frazee Offensive SecurityPr Offensive Security Offensive SecurityCsaba Fitzl @theevilbit Offensive SecurityAntonio Zekic @antoniozekic Dataflow SecurityRon Masas ImpervaMurray Mike Mikko Kenttälä ) @Turmio_ SensorFuYiğit Can YILMAZ @yilmazcanyigit Certik Skyfall Team Certik Skyfall Team Ant Security Light Ant Security Lightpattern-f @pattern_F_ Ant Security LightZweig Kunlun LabLinus Henze Pinauten GmbHPan ZhenPeng @Peterpan0927 STAR Labs SG PteMichael (Biscuit) Thomas 张师傅(@京东蓝军) Ferdous Saljooki @malwarezoo Jamf Softwarean anonymous researcher Zhipeng Huo @R3dF09 Tencent Security Xuanwu LabDohyun Lee @l33d0hyun PK SecurityAdam M. SecuRing SecuRingAdam M. BreakPoint Security Research BreakPoint Security ResearchRon Masas BreakPoint Security ResearchMeng Zhang (鲸落) NorthSeaBrian McNulty Texts TextsKishan Bagaria TextsMichael DePlante @izobashi Trend Micro Zero Day InitiativeGergely Kalman @gergely_kalman Kirin @Pwnrin baba yaga weize she Berke Kırbaş Harsh Jaiswal Serkan Erayabakan George Mason UniversityDavid Kotval George Mason UniversityAkincibor George Mason UniversitySina Ahmadi George Mason UniversityBilly Tabrizi Kirin @Pwnrin SecuRingTomi Tokics @tomitokics iTomsn0wLuan Herrera @lbherrera_ Adriatik Raci Sentry CybersecurityNarendra Bhati (twitter.com/imnarendrabhati) Suma Soft PvtPune (India) Noah Roskin-Frazee (ZeroClicks.ai Lab) James Duffy (mangoSecure) Ron Masas BreakPointJames Hutchins Thijs Alkemade @xnyhps Computest Sector 7Andrew Haggard Arsenii Kostromin (0x3c3e) Offensive SecurityJoshua Jewett @JoshJewett33 Offensive SecurityFrancisco Alonso @revskills PK Security PK SecurityFrancisco Alonso @revskills Jie Ding @Lime HKUS3 LabAjou University Abysslab Dong Jun Kim @smlijun Jong Seong Kim @nevul37 Bill Marczak The Citizen Lab at The University of Toronto's Munk SchoolMaddie Stone Google's Threat Analysis GroupClaire Houston Anonymous Dong Jun Kim @smlijun AbyssLab AbyssLabJong Seong Kim @nevul37 AbyssLabWang Yu CyberservalAn anonymous researcher MacEnhanceJeremy Legendre MacEnhanceFelix Kratz Koh M. Nakagawa @tsunek0h Adam M. Yishu Wang Will Brattain at Trail Bitszer0k Mohamed GHANNAM @_simo36 Tim Michaud @TimGMichaud MoveworksWojciech Reguła @_r3ggi Chris Ross (Zoom) ABC Research s.r.o. w0wbox
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS | <14 | 14 |
Apple iOS | <17 | 17 |
iPadOS | <17 | 17 |
iPadOS | <17.0 | |
Apple iPhone OS | <17.0 | |
Apple macOS | <14.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-41060 is a critical vulnerability that can lead to remote kernel code execution.
To fix CVE-2023-41060, update your device to macOS Sonoma 14, iOS 17, or iPadOS 17.
CVE-2023-41060 affects Apple iOS versions up to 17, iPadOS versions up to 17, and macOS versions up to 14.
Yes, CVE-2023-41060 can potentially be exploited by a remote user to execute unauthorized code.
CVE-2023-41060 is classified as a type confusion vulnerability that affects the kernel of the operating system.