First published: Wed Oct 25 2023(Updated: )
Pro Res. The issue was addressed with improved bounds checks.
Credit: Mingxuan Yang @PPPF00L 360 Vulnerability Research Institute 360 Vulnerability Research Institutehappybabywu 360 Vulnerability Research InstituteGuang Gong 360 Vulnerability Research Institute product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS Monterey | <12.7.1 | 12.7.1 |
Apple macOS | <14.1 | 14.1 |
Apple macOS | <13.6.1 | 13.6.1 |
tvOS | <17.1 | 17.1 |
iPadOS | <17.1 | |
iPadOS | >=16.0<16.7.2 | |
Apple iPhone OS | <17.1 | |
Apple iPhone OS | >=16.0<16.7.2 | |
Apple macOS | >=12.0<12.7.1 | |
Apple macOS | >=13.0<13.6.1 | |
Apple macOS | =14.0 | |
tvOS | <17.1 | |
Apple iOS | <17.1 | 17.1 |
iPadOS | <17.1 | 17.1 |
Apple iOS | <16.7.2 | 16.7.2 |
iPadOS | <16.7.2 | 16.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2023-42873 has a high severity level due to the potential for apps to execute arbitrary code.
To fix CVE-2023-42873, update your device to the latest versions of macOS Sonoma 14.1, tvOS 17.1, macOS Monterey 12.7.1, iOS 16.7.2, and iPadOS 16.7.2 or later.
Affected products include macOS Monterey versions prior to 12.7.1, iOS versions prior to 16.7.2, iPadOS versions prior to 16.7.2, as well as older versions of macOS Ventura and macOS Sonoma.
CVE-2023-42873 is associated with improper bounds checks that could allow an application to execute unauthorized code.
Yes, CVE-2023-42873 has been resolved in the latest software releases including macOS Sonoma, tvOS, iOS, and iPadOS.