First published: Mon Dec 11 2023(Updated: )
Accessibility. A privacy issue was addressed with improved private data redaction for log entries.
Credit: Meysam Firouzi @R00tkitSMM Junsung Lee Zhenjiang Zhao Pangu TeamQianxin product-security@apple.com Noah Roskin-Frazee Pr Ivan Fratric Google Project Zero Trend Micro Zero Day InitiativeMichael DePlante @izobashi Trend Micro Zero Day InitiativeMickey Jin @patch1t an anonymous researcher Marc Newlin SkySafeKoh M. Nakagawa @tsunek0h CVE-2023-38545 CVE-2023-38039 CVE-2023-38546 Yann GASCUEL Alter SolutionsAnthony Cruz Tyrant Corp @App Wojciech Regula SecuRingPan ZhenPeng @Peterpan0927 STAR Labs SG PteEloi Benoist-Vanderbeken @elvanderb SynacktivCVE-2023-42893 CVE-2023-3618 CVE-2020-19185 CVE-2020-19186 CVE-2020-19187 CVE-2020-19188 CVE-2020-19189 CVE-2020-19190 Ron Masas BreakPointCsaba Fitzl @theevilbit OffSecCsaba Fitzl @theevilbit Offensive SecurityArsenii Kostromin (0x3c3e) Mattie Behrens Joshua Jewett @JoshJewett33 Zhongquan Li @Guluisacat Zhongquan Li @Guluisacat Dawn Security Lab of JingDongCVE-2023-5344 Pwn2car Zoom Offensive Security Team Nan Wang @eternalsakura13 360 Vulnerability Research Instituterushikesh nandedkar SungKwon Lee (Demon.Team) Kirin @Pwnrin Don Clarke
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS Monterey | <12.7.2 | 12.7.2 |
Apple macOS | <14.2 | 14.2 |
Apple macOS | <13.6.3 | 13.6.3 |
tvOS | <17.2 | 17.2 |
Apple iOS, iPadOS, and watchOS | <16.7.3 | |
Apple iOS, iPadOS, and watchOS | >=17.0<17.2 | |
iOS | <16.7.3 | |
iOS | >=17.0<17.2 | |
Apple iOS and macOS | >=12.0.0<12.7.2 | |
Apple iOS and macOS | >=13.0<13.6.3 | |
Apple iOS and macOS | >=14.0<14.2 | |
tvOS | <10.2 | |
Apple iOS, iPadOS, and watchOS | <10.2 | |
Apple iOS, iPadOS, and watchOS | <16.7.3 | 16.7.3 |
Apple iOS, iPadOS, and watchOS | <16.7.3 | 16.7.3 |
Apple iOS, iPadOS, and watchOS | <17.2 | 17.2 |
Apple iOS, iPadOS, and watchOS | <17.2 | 17.2 |
Apple iOS, iPadOS, and watchOS | <10.2 | 10.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2023-42899 has been classified as a moderate severity vulnerability due to the potential impact of memory handling issues.
To fix CVE-2023-42899, update to the latest version of the affected software: macOS Sonoma 14.2, iOS 17.2, iPadOS 17.2, macOS Ventura 13.6.3, macOS Monterey 12.7.2, watchOS 10.2, or tvOS 17.2.
CVE-2023-42899 affects Apple iOS, iPadOS, macOS Monterey, macOS Ventura, macOS Sonoma, watchOS, and tvOS versions prior to the specified updates.
The disclosure date for CVE-2023-42899 has not been specified but is related to the release of security updates in late 2023.
CVE-2023-42899 can lead to potential memory handling vulnerabilities that may allow attackers to exploit the system and compromise user data.