First published: Mon Sep 18 2023(Updated: )
Accessibility. This issue was addressed with improved redaction of sensitive information.
Credit: Csaba Fitzl @theevilbit Offensive Securityzer0k Adam M. Noah Roskin-Frazee Professor Jason Lau (ZeroClicks.ai Lab) Will Brattain at Trail Bits이준성(Junsung Lee) Cross RepublicKirin @Pwnrin NorthSeaMickey Jin @patch1t Certik Skyfall Team Linus Henze Pinauten GmbHPan ZhenPeng @Peterpan0927 STAR Labs SG PteMichael (Biscuit) Thomas 张师傅(@京东蓝军) Sei K. Zhipeng Huo @R3dF09 Tencent Security Xuanwu LabDohyun Lee @l33d0hyun PK SecurityAdam M. SecuRing SecuRingWojciech Regula SecuRingAdam M. BreakPoint Security Research BreakPoint Security ResearchRon Masas BreakPoint Security Researchserkan Gurbuz Kirin @Pwnrin Adriatik Raci Sentry CybersecurityNarendra Bhati (twitter.com/imnarendrabhati) Suma Soft PvtPune (India) Yiğit Can YILMAZ @yilmazcanyigit Arsenii Kostromin (0x3c3e) James Hutchins Arsenii Kostromin (0x3c3e) Offensive SecurityJoshua Jewett @JoshJewett33 Offensive Security Offensive SecurityFrancisco Alonso @revskills PK Security PK SecurityFrancisco Alonso @revskills Jie Ding @Lime HKUS3 LabDong Jun Kim @smlijun AbyssLabJong Seong Kim @nevul37 AbyssLabzhunki 이준성(Junsung Lee) Mohamed GHANNAM @_simo36 Tim Michaud @TimGMichaud MoveworksAntonio Zekic @antoniozekic Dataflow Securityw0wbox Ye Zhang @VAR10CK Baidu SecurityWojciech Reguła @_r3ggi Chris Ross (Zoom) Liang Wei PixiePoint SecurityZhice Yang (ShanghaiTech University) Ron Masas ImpervaMikko Kenttälä ) @Turmio_ SensorFuCertik Skyfall Team Ant Security Lightpattern-f @pattern_F_ Ant Security LightZweig Kunlun LabFélix Poulin-Bélanger Joseph Ravichandran @0xjprx MIT CSAILGergely Kalman @gergely_kalman weize she an anonymous researcher Berke Kırbaş Harsh Jaiswal Tomi Tokics @tomitokics iTomsn0wKenneth Chew Abhay Kailasia @abhay_kailasia Lakshmi Narain College Of Technology BhopalBrian McNulty Offensive SecurityClaire Houston Anonymous Wang Yu Cyberserval
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS, iPadOS, and watchOS | <10 | 10 |
tvOS | <17 | 17 |
Apple iOS and iPadOS | <17 | 17 |
Apple iOS, iPadOS, and macOS | <17 | 17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2023-42875 has been rated as a moderate severity vulnerability due to the risk of sensitive information exposure.
To fix CVE-2023-42875, upgrade affected Apple devices to the latest software versions, such as watchOS 10, iOS 17, or tvOS 17.
CVE-2023-42875 affects Apple devices running watchOS, iOS, iPadOS, and tvOS prior to the latest versions.
CVE-2023-42875 addresses multiple issues including improved redaction of sensitive information and better handling of protocols.
CVE-2023-42875 is primarily a local vulnerability, requiring access to the affected device to exploit it.