First published: Wed Oct 25 2023(Updated: )
Automation. The issue was addressed with improved checks.
Credit: Talal Haj Bakry Mysk IncTommy Mysk @mysk_co Mysk Inc product-security@apple.com Mingxuan Yang @PPPF00L 360 Vulnerability Research Institute 360 Vulnerability Research Institutehappybabywu 360 Vulnerability Research InstituteGuang Gong 360 Vulnerability Research InstituteYiğit Can YILMAZ @yilmazcanyigit CVE-2023-42946 이준성(Junsung Lee) Cross Republic이준성(Junsung Lee) Pedro Ribeiro @pedrib1337 Agile Information SecurityVitor Pedreira @0xvhp_ Agile Information SecurityKirin @Pwnrin SecuRingWojciech Regula SecuRing Computer ScienceCristian Dinca Computer ScienceRomania Bistrit Dahal JZ Linus Henze Pinauten GmbHMickey Jin @patch1t Grzegorz Riegel Adam M. Csaba Fitzl @theevilbit Offensive SecurityMichael (Biscuit) Thomas - @social.lol @biscuit CVE-2023-42823 an anonymous researcher inooo Alex Renda Claire Houston Kacper Kwapisz @KKKas_ Adis Alic Sam Lakmaker Ting Ding James Mancz Omar Shibli Lorenzo Cavallaro Harry Lewandowski Abhay Kailasia @abhay_kailasia Lakshmi Narain College Of Technology Bhopal IndiaPeter Nguyễn Vũ Hoàng @peternguyen14 STAR Labs SG PteTomi Tokics @tomitokics iTomsn0wZhipeng Huo @R3dF09 Tencent Security Xuanwu LabNoah Roskin-Frazee Pr
Affected Software | Affected Version | How to fix |
---|---|---|
tvOS | <17.1 | 17.1 |
Apple iOS, iPadOS, and watchOS | <10.1 | 10.1 |
Apple iOS and iPadOS | <17.1 | 17.1 |
Apple iOS, iPadOS, and macOS | <17.1 | 17.1 |
Apple iOS and iPadOS | <16.7.2 | 16.7.2 |
Apple iOS, iPadOS, and macOS | <16.7.2 | 16.7.2 |
Apple iOS, iPadOS, and macOS | <16.7.2 | |
Apple iOS, iPadOS, and macOS | >=17.0<17.1 | |
iPhone OS | <16.7.2 | |
iPhone OS | >=17.0<17.1 | |
tvOS | <17.1 | |
Apple iOS, iPadOS, and watchOS | <10.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
The vulnerability ID of this issue is CVE-2023-42846.
The software affected by this vulnerability includes watchOS, iOS, iPadOS, and tvOS.
This vulnerability was fixed by removing the vulnerable code.
Versions 10.1 of watchOS, 16.7.2 and 17.1 of iOS and iPadOS, and 17.1 of tvOS are fixed.
Yes, a device may be passively tracked by its Wi-Fi MAC address.