First published: Tue Sep 26 2023(Updated: )
Airport. A permissions issue was addressed with improved redaction of sensitive information.
Credit: product-security@apple.com Koh M. Nakagawa @tsunek0h Adam M. Noah Roskin-Frazee Professor Jason Lau (ZeroClicks.ai Lab) Kirin @Pwnrin Yishu Wang Will Brattain at Trail BitsCristian Dinca Computer ScienceRomania JeongOhKyea Theori이준성(Junsung Lee) Cross RepublicKirin @Pwnrin NorthSeaWojciech Regula SecuRingHalle Winkler Politepix @hallewinkler Sei K. Mickey Jin @patch1t Noah Roskin-Frazee Offensive SecurityPr Offensive Security Offensive SecurityCsaba Fitzl @theevilbit Offensive SecurityAntonio Zekic @antoniozekic Dataflow SecurityRon Masas ImpervaMurray Mike Mikko Kenttälä ) @Turmio_ SensorFuYiğit Can YILMAZ @yilmazcanyigit Certik Skyfall Team Certik Skyfall Team Ant Security Light Ant Security Lightpattern-f @pattern_F_ Ant Security LightZweig Kunlun LabLinus Henze Pinauten GmbHPan ZhenPeng @Peterpan0927 STAR Labs SG PteMichael (Biscuit) Thomas 张师傅(@京东蓝军) Joseph Ravichandran @0xjprx MIT CSAILFerdous Saljooki @malwarezoo Jamf Softwarean anonymous researcher Zhipeng Huo @R3dF09 Tencent Security Xuanwu LabDohyun Lee @l33d0hyun PK SecurityAdam M. SecuRing SecuRingAdam M. BreakPoint Security Research BreakPoint Security ResearchRon Masas BreakPoint Security ResearchMeng Zhang (鲸落) NorthSeaBrian McNulty Texts TextsKishan Bagaria TextsMichael DePlante @izobashi Trend Micro Zero Day InitiativeGergely Kalman @gergely_kalman baba yaga weize she Berke Kırbaş Harsh Jaiswal Serkan Erayabakan George Mason UniversityDavid Kotval George Mason UniversityAkincibor George Mason UniversitySina Ahmadi George Mason UniversityBilly Tabrizi Kirin @Pwnrin SecuRingTomi Tokics @tomitokics iTomsn0wLuan Herrera @lbherrera_ Adriatik Raci Sentry CybersecurityNarendra Bhati (twitter.com/imnarendrabhati) Suma Soft PvtPune (India) Noah Roskin-Frazee (ZeroClicks.ai Lab) James Duffy (mangoSecure) Ron Masas BreakPointJames Hutchins Thijs Alkemade @xnyhps Computest Sector 7Andrew Haggard Arsenii Kostromin (0x3c3e) Offensive SecurityJoshua Jewett @JoshJewett33 Offensive SecurityFrancisco Alonso @revskills PK Security PK SecurityFrancisco Alonso @revskills Jie Ding @Lime HKUS3 LabAjou University Abysslab Dong Jun Kim @smlijun Jong Seong Kim @nevul37 Bill Marczak The Citizen Lab at The University of Toronto's Munk SchoolMaddie Stone Google's Threat Analysis GroupClaire Houston Anonymous Dong Jun Kim @smlijun AbyssLab AbyssLabJong Seong Kim @nevul37 AbyssLabWang Yu CyberservalAn anonymous researcher MacEnhanceJeremy Legendre MacEnhanceFelix Kratz zer0k Mohamed GHANNAM @_simo36 Tim Michaud @TimGMichaud MoveworksWojciech Reguła @_r3ggi Chris Ross (Zoom) ABC Research s.r.o. w0wbox
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS | <14.0 | |
Apple macOS | <14 | 14 |
<14 | 14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-42876 has been classified with a high severity due to the potential impact of sensitive information exposure.
To fix CVE-2023-42876, users should upgrade to the latest version of macOS Sonoma, specifically version 14 or later.
CVE-2023-42876 addresses a permissions issue and buffer overflow that could lead to vulnerabilities in macOS.
CVE-2023-42876 affects macOS versions prior to 14.0.
CVE-2023-42876 impacts several components of macOS, including Airport and App Store functionalities.