First published: Wed Oct 25 2023(Updated: )
A privacy issue was addressed with improved handling of files. This issue is fixed in watchOS 10.1, macOS Sonoma 14.1, macOS Monterey 12.7.2, macOS Ventura 13.6.3, iOS 17.1 and iPadOS 17.1. An app may be able to access sensitive user data.
Credit: Csaba Fitzl @theevilbit Offensive SecurityCsaba Fitzl @theevilbit Offensive SecurityCsaba Fitzl @theevilbit Offensive SecurityCsaba Fitzl @theevilbit Offensive SecurityCsaba Fitzl @theevilbit Offensive Security product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS Monterey | <12.7.2 | 12.7.2 |
Apple macOS | <14.1 | 14.1 |
Apple macOS | <13.6.3 | 13.6.3 |
watchOS | <10.1 | 10.1 |
iPadOS | <17.1 | |
Apple iPhone OS | <17.1 | |
Apple macOS | >=12.0<12.7.2 | |
Apple macOS | >=13.0<13.6.3 | |
Apple macOS | =14.0 | |
watchOS | <10.1 | |
Apple iOS | <17.1 | 17.1 |
iPadOS | <17.1 | 17.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The severity of CVE-2023-42834 is classified as a privacy issue potentially allowing unauthorized access to sensitive user data.
To fix CVE-2023-42834, update your device to the latest versions of iOS 17.1, iPadOS 17.1, macOS Monterey 12.7.2, macOS Ventura 13.6.3, macOS Sonoma 14.1, or watchOS 10.1.
CVE-2023-42834 affects iOS, iPadOS, macOS Monterey, macOS Ventura, macOS Sonoma, and watchOS versions prior to the specified updates.
The fix for CVE-2023-42834 includes improved handling of files to enhance user privacy and data security.
As of now, there are no reports of active exploitation of CVE-2023-42834.