First published: Wed Oct 25 2023(Updated: )
mDNSResponder. This issue was addressed by removing the vulnerable code.
Credit: Talal Haj Bakry Mysk IncTommy Mysk @mysk_co Mysk IncTalal Haj Bakry Mysk IncTommy Mysk @mysk_co Mysk IncTalal Haj Bakry Mysk IncTommy Mysk @mysk_co Mysk IncTalal Haj Bakry Mysk IncTommy Mysk @mysk_co Mysk Inc product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPadOS | <16.7.2 | |
Apple iPadOS | >=17.0<17.1 | |
Apple iPhone OS | <16.7.2 | |
Apple iPhone OS | >=17.0<17.1 | |
Apple tvOS | <17.1 | |
Apple watchOS | <10.1 | |
Apple watchOS | <10.1 | 10.1 |
Apple iOS | <16.7.2 | 16.7.2 |
Apple iPadOS | <16.7.2 | 16.7.2 |
Apple tvOS | <17.1 | 17.1 |
Apple iOS | <17.1 | 17.1 |
Apple iPadOS | <17.1 | 17.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID of this issue is CVE-2023-42846.
The software affected by this vulnerability includes watchOS, iOS, iPadOS, and tvOS.
This vulnerability was fixed by removing the vulnerable code.
Versions 10.1 of watchOS, 16.7.2 and 17.1 of iOS and iPadOS, and 17.1 of tvOS are fixed.
Yes, a device may be passively tracked by its Wi-Fi MAC address.