First published: Wed Oct 25 2023(Updated: )
A privacy issue was addressed with improved handling of files. This issue is fixed in watchOS 10.1, macOS Sonoma 14.1, macOS Monterey 12.7.2, macOS Ventura 13.6.3, iOS 17.1 and iPadOS 17.1. An app may be able to access sensitive user data.
Credit: Csaba Fitzl @theevilbit Offensive Security product-security@apple.com Koh M. Nakagawa @tsunek0h Yann GASCUEL Alter SolutionsJewel Lambert Anthony Cruz Tyrant Corp @App Wojciech Regula SecuRingMeysam Firouzi @R00tkitSMM Junsung Lee an anonymous researcher Pan ZhenPeng @Peterpan0927 STAR Labs SG PteEloi Benoist-Vanderbeken @elvanderb SynacktivCVE-2023-42893 CVE-2023-3618 CVE-2020-19185 CVE-2020-19186 CVE-2020-19187 CVE-2020-19188 CVE-2020-19189 CVE-2020-19190 Yiğit Can YILMAZ @yilmazcanyigit Offensive Security Offensive SecurityYiğit Can YILMAZ @yilmazcanyigit Csaba Fitzl @theevilbit OffSecArsenii Kostromin (0x3c3e) Zhongquan Li @Guluisacat Zhongquan Li @Guluisacat Dawn Security Lab of JingDongCVE-2023-5344 Zhipeng Huo @R3dF09 Tencent Security Xuanwu LabMickey Jin @patch1t Kirin @Pwnrin Noah Roskin-Frazee Pr Adam M. Michael (Biscuit) Thomas - @social.lol @biscuit JZ Linus Henze Pinauten GmbHGrzegorz Riegel Talal Haj Bakry Mysk IncTommy Mysk @mysk_co Mysk IncKirin @Pwnrin SecuRing Computer ScienceCristian Dinca Computer ScienceRomania Bistrit Dahal CVE-2023-42946 이준성(Junsung Lee) Cross Republic이준성(Junsung Lee) Pedro Ribeiro @pedrib1337 Agile Information SecurityVitor Pedreira @0xvhp_ Agile Information SecurityCVE-2023-42823 inooo Mingxuan Yang @PPPF00L 360 Vulnerability Research Institutehappybabywu 360 Vulnerability Research InstituteGuang Gong 360 Vulnerability Research Institute 360 Vulnerability Research InstituteAdis Alic Sam Lakmaker Ting Ding James Mancz Omar Shibli Lorenzo Cavallaro Harry Lewandowski Kacper Kwapisz @KKKas_ Abhay Kailasia @abhay_kailasia Lakshmi Narain College Of Technology Bhopal IndiaPeter Nguyễn Vũ Hoàng @peternguyen14 STAR Labs SG PteTomi Tokics @tomitokics iTomsn0w
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS | <14.1 | 14.1 |
Apple iOS, iPadOS, and watchOS | <10.1 | 10.1 |
macOS | <12.7.2 | 12.7.2 |
macOS Ventura | <13.6.3 | 13.6.3 |
iPadOS | <17.1 | |
iPhone OS | <17.1 | |
macOS | >=12.0<12.7.2 | |
macOS | >=13.0<13.6.3 | |
macOS | =14.0 | |
Apple iOS, iPadOS, and watchOS | <10.1 | |
Apple iOS and iPadOS | <17.1 | 17.1 |
Apple iOS, iPadOS, and macOS | <17.1 | 17.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
The severity of CVE-2023-42834 is classified as a privacy issue potentially allowing unauthorized access to sensitive user data.
To fix CVE-2023-42834, update your device to the latest versions of iOS 17.1, iPadOS 17.1, macOS Monterey 12.7.2, macOS Ventura 13.6.3, macOS Sonoma 14.1, or watchOS 10.1.
CVE-2023-42834 affects iOS, iPadOS, macOS Monterey, macOS Ventura, macOS Sonoma, and watchOS versions prior to the specified updates.
The fix for CVE-2023-42834 includes improved handling of files to enhance user privacy and data security.
As of now, there are no reports of active exploitation of CVE-2023-42834.