Advisory Published
Updated

CVE-2023-42969

First published: Mon Sep 18 2023(Updated: )

Accessibility. This issue was addressed with improved redaction of sensitive information.

Credit: pattern-f @pattern_F_ Ant Security LightMohamed GHANNAM @_simo36 Ye Zhang @VAR10CK Baidu SecurityTim Michaud @TimGMichaud MoveworksChris Ross (Zoom) Liang Wei PixiePoint SecurityJeongOhKyea Theori이준성(Junsung Lee) Cross RepublicMickey Jin @patch1t Pan ZhenPeng @Peterpan0927 STAR Labs SG PteLinus Henze Pinauten GmbHBill Marczak The Citizen Lab at The University of Toronto's Munk SchoolMaddie Stone Google's Threat Analysis GroupZhipeng Huo @R3dF09 Tencent Security Xuanwu LabDohyun Lee @l33d0hyun PK SecurityAdam M. SecuRing SecuRingWojciech Regula SecuRingCertik Skyfall Team Yiğit Can YILMAZ @yilmazcanyigit Kirin @Pwnrin James Hutchins Wojciech Reguła @_r3ggi Csaba Fitzl @theevilbit Offensive Securityzer0k Adam M. Noah Roskin-Frazee Professor Jason Lau (ZeroClicks.ai Lab) Will Brattain at Trail BitsKirin @Pwnrin NorthSeaZhice Yang (ShanghaiTech University) Antonio Zekic @antoniozekic Dataflow SecurityRon Masas ImpervaMikko Kenttälä ) @Turmio_ SensorFuCertik Skyfall Team Ant Security LightZweig Kunlun LabFélix Poulin-Bélanger Michael (Biscuit) Thomas 张师傅(@京东蓝军) Joseph Ravichandran @0xjprx MIT CSAILSei K. Adam M. BreakPoint Security Research BreakPoint Security ResearchRon Masas BreakPoint Security ResearchGergely Kalman @gergely_kalman weize she an anonymous researcher Berke Kırbaş Harsh Jaiswal Tomi Tokics @tomitokics iTomsn0wAdriatik Raci Sentry CybersecurityNarendra Bhati (twitter.com/imnarendrabhati) Suma Soft PvtPune (India) Kenneth Chew Arsenii Kostromin (0x3c3e) Abhay Kailasia @abhay_kailasia Lakshmi Narain College Of Technology BhopalBrian McNulty Offensive SecurityArsenii Kostromin (0x3c3e) Offensive SecurityJoshua Jewett @JoshJewett33 Offensive Security Offensive SecurityFrancisco Alonso @revskills PK Security PK SecurityFrancisco Alonso @revskills Jie Ding @Lime HKUS3 LabDong Jun Kim @smlijun AbyssLabJong Seong Kim @nevul37 AbyssLabzhunki 이준성(Junsung Lee) Claire Houston Anonymous Wang Yu Cyberservalw0wbox

Affected SoftwareAffected VersionHow to fix
macOS Ventura<13.6
13.6
Apple iOS and iPadOS<17
17
Apple iOS, iPadOS, and macOS<17
17
macOS<12.7
12.7

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is the severity of CVE-2023-42969?

    CVE-2023-42969 has been rated as a high-severity vulnerability due to its potential impact on sensitive information exposure.

  • How do I fix CVE-2023-42969?

    To fix CVE-2023-42969, update affected software to macOS Ventura version 13.6 or iOS/iPadOS version 17.

  • What products are affected by CVE-2023-42969?

    CVE-2023-42969 affects macOS Ventura versions up to 13.6 and iOS/iPadOS versions up to 17.

  • What type of issue does CVE-2023-42969 address?

    CVE-2023-42969 addresses an accessibility issue related to the redaction of sensitive information.

  • Is there a specific update release for CVE-2023-42969?

    Yes, the fixes for CVE-2023-42969 are included in the latest updates for macOS Ventura 13.6 and iOS/iPadOS 17.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203