First published: Wed Oct 25 2023(Updated: )
A logic issue was addressed with improved checks. This issue is fixed in iOS 17.1 and iPadOS 17.1, macOS Ventura 13.6.3, macOS Sonoma 14.1, macOS Monterey 12.7.2. An attacker may be able to access connected network volumes mounted in the home directory.
Credit: Yiğit Can YILMAZ @yilmazcanyigit product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS Monterey | <12.7.2 | 12.7.2 |
Apple macOS | <14.1 | 14.1 |
Apple macOS | <13.6.3 | 13.6.3 |
iPadOS | <17.1 | |
Apple iPhone OS | <17.1 | |
Apple macOS | >=12.0<12.7.2 | |
Apple macOS | >=13.0<13.6.3 | |
Apple macOS | =14.0 | |
Apple iOS | <17.1 | 17.1 |
iPadOS | <17.1 | 17.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-42836 is considered to have a medium severity due to the potential for unauthorized access to connected network volumes.
To fix CVE-2023-42836, upgrade your device to iOS 17.1, iPadOS 17.1, macOS Ventura 13.6.3, macOS Sonoma 14.1, or macOS Monterey 12.7.2.
CVE-2023-42836 affects iOS versions prior to 17.1, iPadOS versions prior to 17.1, and various macOS versions prior to their respective fix releases.
There is no specific workaround available for CVE-2023-42836; the recommended solution is to update the software.
CVE-2023-42836 was addressed by Apple in their recent update releases.