First published: Mon Jul 24 2023(Updated: )
WebKit. The issue was addressed with improved memory handling.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS | <13.5 | 13.5 |
tvOS | <16.6 | 16.6 |
Apple Mobile Safari | <16.6 | 16.6 |
Apple iOS, iPadOS, and watchOS | <16.6 | 16.6 |
Apple iOS, iPadOS, and watchOS | <16.6 | 16.6 |
Apple iOS, iPadOS, and watchOS | <9.6 | 9.6 |
Apple Mobile Safari | <16.6 | |
Apple iOS, iPadOS, and watchOS | <16.6 | |
iStyle @cosme iPhone OS | <16.6 | |
Apple iOS and macOS | <13.5 | |
tvOS | <16.6 | |
Apple iOS, iPadOS, and watchOS | <9.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-42866 is classified with a medium severity due to its potential impact on affected software.
To address CVE-2023-42866, users should update their affected Apple products to the latest version, specifically beyond version 16.6 for Safari, iOS, iPadOS, and tvOS, and to versions beyond 13.5 for macOS and 9.6 for watchOS.
CVE-2023-42866 affects multiple Apple products including Safari, iOS, iPadOS, macOS Ventura, watchOS, and tvOS versions up to 16.6 or 9.6, depending on the product.
CVE-2023-42866 addresses issues related to memory handling in WebKit that could potentially be exploited.
Until the affected devices are updated to versions that address CVE-2023-42866, it is recommended to avoid potentially risky activities such as browsing untrusted websites.