First published: Mon Jul 24 2023(Updated: )
Software Update. A race condition was addressed with improved state handling.
Credit: Arsenii Kostromin (0x3c3e) Arsenii Kostromin (0x3c3e) Arsenii Kostromin (0x3c3e) product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS Monterey | <12.6.8 | 12.6.8 |
Apple macOS | >=11.0<11.7.9 | |
Apple macOS | >=12.0.0<12.6.8 | |
Apple macOS | >=13.0<13.5 | |
Apple macOS | <11.7.9 | 11.7.9 |
Apple macOS | <13.5 | 13.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The severity of CVE-2023-42832 has been classified as 'moderate'.
To fix CVE-2023-42832, update to the latest version of macOS Monterey, Big Sur, or Ventura as specified by Apple's recommendations.
CVE-2023-42832 affects macOS versions 11.0 to 11.7.9, 12.0 to 12.6.8, and 13.0 to 13.5.
CVE-2023-42832 is categorized as a race condition vulnerability.
As of now, there are no publicly known exploits specifically targeting CVE-2023-42832.