First published: Thu Sep 07 2023(Updated: )
A validation issue was addressed with improved logic. This issue is fixed in watchOS 9.6.2, iOS 16.6.1 and iPadOS 16.6.1. A maliciously crafted attachment may result in arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
Credit: Apple product-security@apple.com product-security@apple.com Apple product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS | <16.6.1 | 16.6.1 |
Apple iPadOS | <16.6.1 | 16.6.1 |
Apple watchOS | <9.6.2 | 9.6.2 |
Apple iPadOS | <16.6.1 | |
Apple iPhone OS | <16.6.1 | |
Apple watchOS | <9.6.2 | |
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-41061 is a code execution vulnerability in Apple iOS, iPadOS, and watchOS that allows for arbitrary code execution due to a validation issue with attachments.
CVE-2023-41061 has a severity rating of 7.8 out of 10, which is considered high.
CVE-2023-41061 affects watchOS versions up to and excluding 9.6.2, iOS versions up to and excluding 16.6.1, and iPadOS versions up to and excluding 16.6.1.
To fix CVE-2023-41061, update your device to watchOS 9.6.2, iOS 16.6.1, or iPadOS 16.6.1.
Apple is aware of a report that CVE-2023-41061 may have been actively exploited.