First published: Mon Jul 24 2023(Updated: )
Security. This issue was addressed by removing the vulnerable code.
Credit: James Duffy (mangoSecure) product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS | <11.7.9 | 11.7.9 |
macOS | <12.6.8 | 12.6.8 |
macOS Ventura | <13.5 | 13.5 |
Apple iOS and iPadOS | <15.7.8 | 15.7.8 |
Apple iOS, iPadOS, and macOS | <15.7.8 | 15.7.8 |
Apple iOS, iPadOS, and macOS | <15.7.8 | |
iPhone OS | <15.7.8 | |
macOS | >=11.0<11.7.9 | |
macOS | >=12.0.0<12.6.8 | |
macOS | >=13.0<13.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-42831 is a security vulnerability that allows an app to potentially fingerprint users.
To fix CVE-2023-42831, update to macOS Big Sur 11.7.9, iOS 15.7.8, iPadOS 15.7.8, macOS Monterey 12.6.8, or macOS Ventura 13.5.
CVE-2023-42831 affects macOS Big Sur, macOS Monterey, macOS Ventura, iOS, and iPadOS versions prior to the indicated fixed versions.
No, updating to the specified versions will mitigate the risk associated with CVE-2023-42831.
If you do not update, your device may remain vulnerable to user fingerprinting exploits detailed in CVE-2023-42831.