First published: Mon Mar 27 2023(Updated: )
Accessibility. A privacy issue was addressed with improved private data redaction for log entries.
Credit: jzhu Trend Micro Zero Day InitiativeMeysam Firouzi @R00tkitSMM Mbition MercedesMeysam Firouzi @R00tkitSMM Mbition MercedesMickey Jin @patch1t Xin Huang @11iaxH CVE-2023-0049 CVE-2023-0051 CVE-2023-0054 CVE-2023-0288 CVE-2023-0433 CVE-2023-0512 Gertjan Franken imecKU Leuven hazbinhotel Trend Micro Zero Day InitiativeGeorgy Kucherin @kucher1n KasperskyLeonid Bezvershenko @bzvr_ KasperskyBoris Larin @oct0xor Kaspersky KasperskyValentin Pashkov Kasperskyan anonymous researcher Anonymous Trend Micro Zero Day InitiativeDohyun Lee @l33d0hyun SSD Labscrixer @pwning_me SSD LabsABC Research s.r.o. Mohamed Ghannam @_simo36 Adam M. Brandon Dalton @partyD0lphin Red CanaryChan Shue Long Offensive Security Offensive SecurityCsaba Fitzl @theevilbit Offensive SecurityRıza Sabuncu @rizasabuncu Yiğit Can YILMAZ @yilmazcanyigit JeongOhKyea Tingting Yin Tsinghua UniversityJunoh Lee at Theori CVE-2022-43551 CVE-2022-43552 Aleksandar Nikolic Cisco TalosMikko Kenttälä ) @Turmio_ SensorFuJoshua Jones Ye Zhang @VAR10CK Baidu SecurityJubaer Alnazi TRS Group of Companiesryuzaki Murray Mike Pan ZhenPeng @Peterpan0927 STAR Labs SG PteArsenii Kostromin (0x3c3e) Félix Poulin-Bélanger David Pan Ogea Xinru Chi Pangu LabNed Williamson Google Project ZeroAdam Doupé ASU SEFCOMsqrtpwn an anonymous researcher Red CanaryMilan Tenk F FArthur Valiev FZweig Kunlun LabZhuowei Zhang developStorm Khiem Tran Mickey Jin @patch1t FFRI Security IncKoh M. Nakagawa FFRI Security IncMasahiro Kawada @kawakatz GMO Cybersecurity by IeraeJubaer Alnazi Jabin TRS Group Of Companies Alibaba GroupWenchao Li Alibaba GroupXiaolong Bai Alibaba GroupGuilherme Rambo Best Buddy AppsMeysam Firouzi @R00tkitSMM Mbition Mercedes product-security@apple.com Pan ZhenPeng STAR Labs SG PteZechao Cai @Zech4o Zhejiang UniversityAbhay Kailasia @abhay_kailasia Lakshmi Narain College Of Technology BhopalAnton Spivak Hyeon Park @tree_segment Team ApplePIEMohamed GHANNAM @_simo36 Mohamed GHANNAM Itay Iellin General Motors Product Cyber SecurityJianjun Dai 360 Vulnerability Research InstituteGuang Gong 360 Vulnerability Research Institute
Affected Software | Affected Version | How to fix |
---|---|---|
tvOS | <16.4 | 16.4 |
Apple iOS, iPadOS, and watchOS | <16.4 | 16.4 |
Apple iOS, iPadOS, and watchOS | <16.4 | 16.4 |
Apple iOS, iPadOS, and watchOS | <9.4 | 9.4 |
Apple iOS, iPadOS, and watchOS | <16.4 | |
iStyle @cosme iPhone OS | <16.4 | |
Apple iOS and macOS | <13.3 | |
tvOS | <16.4 | |
Apple iOS, iPadOS, and watchOS | <9.4 | |
macOS Ventura | <13.3 | 13.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2023-42865 is a moderate severity vulnerability that addresses privacy issues and buffer overflow in Apple's software.
To fix CVE-2023-42865, update affected Apple products to the latest software version, specifically 16.4 for iOS, iPadOS, and tvOS, and 13.3 for macOS Ventura.
CVE-2023-42865 affects Apple iOS, iPadOS, macOS Ventura, watchOS, and tvOS versions up to 16.4 or 13.3 respectively.
CVE-2023-42865 addresses privacy issues related to log entries, buffer overflow vulnerabilities, and out-of-bounds read issues.
The privacy issue in CVE-2023-42865 was mitigated with improved private data redaction for log entries.