First published: Wed Oct 25 2023(Updated: )
libxpc. This issue was addressed with improved handling of symlinks.
Credit: Mickey Jin @patch1t product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS | <14.1 | 14.1 |
Apple macOS | <13.6.1 | 13.6.1 |
watchOS | <10.1 | 10.1 |
tvOS | <17.1 | 17.1 |
iPadOS | <16.7.2 | |
iPadOS | =17.0 | |
Apple iPhone OS | <16.7.2 | |
Apple iPhone OS | =17.0 | |
Apple macOS | >=13.0<13.6.1 | |
Apple macOS | =14.0 | |
tvOS | <=17.1 | |
watchOS | <10.1 | |
Apple iOS | <16.7.2 | 16.7.2 |
iPadOS | <16.7.2 | 16.7.2 |
Apple iOS | <17.1 | 17.1 |
iPadOS | <17.1 | 17.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2023-42942 has been classified as a high-severity vulnerability due to its potential impact on systems.
To fix CVE-2023-42942, update your device to the latest versions, including watchOS 10.1, macOS Sonoma 14.1, tvOS 17.1, iOS 16.7.2, iPadOS 16.7.2, iOS 17.1, or iPadOS 17.1.
CVE-2023-42942 affects various Apple systems including iOS, iPadOS, macOS, tvOS, and watchOS.
Yes, a malicious app can exploit CVE-2023-42942 to perform unintended actions on affected systems.
CVE-2023-42942 was addressed with improved handling of symlinks to mitigate potential exploitation.