CWE
416 20
Advisory Published
Updated

CVE-2023-42875: Use After Free

First published: Mon Sep 18 2023(Updated: )

Accessibility. This issue was addressed with improved redaction of sensitive information.

Credit: Csaba Fitzl @theevilbit Offensive Securityzer0k Adam M. Noah Roskin-Frazee Professor Jason Lau (ZeroClicks.ai Lab) Will Brattain at Trail Bits이준성(Junsung Lee) Cross RepublicKirin @Pwnrin NorthSeaMickey Jin @patch1t Certik Skyfall Team Linus Henze Pinauten GmbHPan ZhenPeng @Peterpan0927 STAR Labs SG PteMichael (Biscuit) Thomas 张师傅(@京东蓝军) Sei K. Zhipeng Huo @R3dF09 Tencent Security Xuanwu LabDohyun Lee @l33d0hyun PK SecurityAdam M. SecuRing SecuRingWojciech Regula SecuRingAdam M. BreakPoint Security Research BreakPoint Security ResearchRon Masas BreakPoint Security Researchserkan Gurbuz Kirin @Pwnrin Adriatik Raci Sentry CybersecurityNarendra Bhati (twitter.com/imnarendrabhati) Suma Soft PvtPune (India) Yiğit Can YILMAZ @yilmazcanyigit Arsenii Kostromin (0x3c3e) James Hutchins Arsenii Kostromin (0x3c3e) Offensive SecurityJoshua Jewett @JoshJewett33 Offensive Security Offensive SecurityFrancisco Alonso @revskills PK Security PK SecurityFrancisco Alonso @revskills Jie Ding @Lime HKUS3 LabDong Jun Kim @smlijun AbyssLabJong Seong Kim @nevul37 AbyssLabzhunki 이준성(Junsung Lee) Mohamed GHANNAM @_simo36 Tim Michaud @TimGMichaud MoveworksAntonio Zekic @antoniozekic Dataflow Securityw0wbox Ye Zhang @VAR10CK Baidu SecurityWojciech Reguła @_r3ggi Chris Ross (Zoom) Liang Wei PixiePoint SecurityZhice Yang (ShanghaiTech University) Ron Masas ImpervaMikko Kenttälä ) @Turmio_ SensorFuCertik Skyfall Team Ant Security Lightpattern-f @pattern_F_ Ant Security LightZweig Kunlun LabFélix Poulin-Bélanger Joseph Ravichandran @0xjprx MIT CSAILGergely Kalman @gergely_kalman weize she an anonymous researcher Berke Kırbaş Harsh Jaiswal Tomi Tokics @tomitokics iTomsn0wKenneth Chew Abhay Kailasia @abhay_kailasia Lakshmi Narain College Of Technology BhopalBrian McNulty Offensive SecurityClaire Houston Anonymous Wang Yu Cyberserval

Affected SoftwareAffected VersionHow to fix
Apple iOS, iPadOS, and watchOS<10
10
tvOS<17
17
Apple iOS and iPadOS<17
17
Apple iOS, iPadOS, and macOS<17
17

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is the severity of CVE-2023-42875?

    CVE-2023-42875 has been rated as a moderate severity vulnerability due to the risk of sensitive information exposure.

  • How do I fix CVE-2023-42875?

    To fix CVE-2023-42875, upgrade affected Apple devices to the latest software versions, such as watchOS 10, iOS 17, or tvOS 17.

  • What types of devices are affected by CVE-2023-42875?

    CVE-2023-42875 affects Apple devices running watchOS, iOS, iPadOS, and tvOS prior to the latest versions.

  • What issues does CVE-2023-42875 address?

    CVE-2023-42875 addresses multiple issues including improved redaction of sensitive information and better handling of protocols.

  • Is CVE-2023-42875 a local or remote vulnerability?

    CVE-2023-42875 is primarily a local vulnerability, requiring access to the affected device to exploit it.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203