CWE
269
Advisory Published
CVE Published
Updated

CVE-2023-42952

First published: Wed Oct 25 2023(Updated: )

Accounts. A privacy issue was addressed with improved private data redaction for log entries.

Credit: Zhipeng Huo @R3dF09 Tencent Security Xuanwu Lab product-security@apple.com an anonymous researcher Koh M. Nakagawa @tsunek0h Yann GASCUEL Alter SolutionsJewel Lambert Anthony Cruz Tyrant Corp @App Wojciech Regula SecuRingCsaba Fitzl @theevilbit Offensive SecurityMeysam Firouzi @R00tkitSMM Junsung Lee Pan ZhenPeng @Peterpan0927 STAR Labs SG PteEloi Benoist-Vanderbeken @elvanderb SynacktivCVE-2023-42893 CVE-2023-3618 CVE-2020-19185 CVE-2020-19186 CVE-2020-19187 CVE-2020-19188 CVE-2020-19189 CVE-2020-19190 Yiğit Can YILMAZ @yilmazcanyigit Offensive Security Offensive SecurityYiğit Can YILMAZ @yilmazcanyigit Csaba Fitzl @theevilbit OffSecArsenii Kostromin (0x3c3e) Zhongquan Li @Guluisacat Zhongquan Li @Guluisacat Dawn Security Lab of JingDongCVE-2023-5344 Kirin @Pwnrin Noah Roskin-Frazee Pr Mickey Jin @patch1t Tomi Tokics @tomitokics iTomsn0wCVE-2023-42823 Peter Nguyễn Vũ Hoàng @peternguyen14 STAR Labs SG PteAdam M. Michael (Biscuit) Thomas - @social.lol @biscuit JZ Linus Henze Pinauten GmbHinooo Grzegorz Riegel Talal Haj Bakry Mysk IncTommy Mysk @mysk_co Mysk IncBistrit Dahal Mingxuan Yang @PPPF00L 360 Vulnerability Research Institutehappybabywu 360 Vulnerability Research InstituteGuang Gong 360 Vulnerability Research Institute 360 Vulnerability Research InstituteAdis Alic Sam Lakmaker Kirin @Pwnrin SecuRing Computer ScienceCristian Dinca Computer ScienceRomania CVE-2023-42946 Ting Ding James Mancz Omar Shibli Lorenzo Cavallaro Harry Lewandowski 이준성(Junsung Lee) Cross Republic이준성(Junsung Lee) Pedro Ribeiro @pedrib1337 Agile Information SecurityVitor Pedreira @0xvhp_ Agile Information SecurityKacper Kwapisz @KKKas_ Abhay Kailasia @abhay_kailasia Lakshmi Narain College Of Technology Bhopal India

Affected SoftwareAffected VersionHow to fix
Apple macOS<14.1
14.1
macOS<12.7.1
12.7.1
macOS Ventura<13.6.3
13.6.3
Apple iOS and iPadOS<17.1
17.1
Apple iOS, iPadOS, and macOS<17.1
17.1
<17.1
<17.1
>=12.0<12.7.1
>=13.0<13.6.3
=14.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is the severity of CVE-2023-42952?

    CVE-2023-42952 has been classified as a vulnerability that allows an app with root privileges to potentially access private information.

  • How do I fix CVE-2023-42952?

    To fix CVE-2023-42952, you should update to the latest versions of iOS 17.1, iPadOS 17.1, macOS Ventura 13.6.3, macOS Sonoma 14.1, or macOS Monterey 12.7.1.

  • Which Apple products are affected by CVE-2023-42952?

    CVE-2023-42952 affects iOS, iPadOS, and several versions of macOS, including Monterey, Ventura, and Sonoma.

  • Is there a need for action regarding CVE-2023-42952?

    Yes, users are strongly advised to update their devices to the latest software versions to mitigate the risks associated with CVE-2023-42952.

  • What types of attacks are possible due to CVE-2023-42952?

    CVE-2023-42952 could potentially allow malicious applications with root privileges to access sensitive user information.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203