First published: Mon Sep 18 2023(Updated: )
Accessibility. This issue was addressed with improved redaction of sensitive information.
Credit: pattern-f @pattern_F_ Ant Security LightMohamed GHANNAM @_simo36 Ye Zhang @VAR10CK Baidu SecurityTim Michaud @TimGMichaud MoveworksChris Ross (Zoom) Liang Wei PixiePoint SecurityJeongOhKyea Theori이준성(Junsung Lee) Cross RepublicMickey Jin @patch1t Pan ZhenPeng @Peterpan0927 STAR Labs SG PteLinus Henze Pinauten GmbHBill Marczak The Citizen Lab at The University of Toronto's Munk SchoolMaddie Stone Google's Threat Analysis GroupZhipeng Huo @R3dF09 Tencent Security Xuanwu LabDohyun Lee @l33d0hyun PK SecurityAdam M. SecuRing SecuRingWojciech Regula SecuRingCertik Skyfall Team Yiğit Can YILMAZ @yilmazcanyigit Kirin @Pwnrin James Hutchins Wojciech Reguła @_r3ggi Csaba Fitzl @theevilbit Offensive Securityzer0k Adam M. Noah Roskin-Frazee Professor Jason Lau (ZeroClicks.ai Lab) Will Brattain at Trail BitsKirin @Pwnrin NorthSeaZhice Yang (ShanghaiTech University) Antonio Zekic @antoniozekic Dataflow SecurityRon Masas ImpervaMikko Kenttälä ) @Turmio_ SensorFuCertik Skyfall Team Ant Security LightZweig Kunlun LabFélix Poulin-Bélanger Michael (Biscuit) Thomas 张师傅(@京东蓝军) Joseph Ravichandran @0xjprx MIT CSAILSei K. Adam M. BreakPoint Security Research BreakPoint Security ResearchRon Masas BreakPoint Security ResearchGergely Kalman @gergely_kalman weize she an anonymous researcher Berke Kırbaş Harsh Jaiswal Tomi Tokics @tomitokics iTomsn0wAdriatik Raci Sentry CybersecurityNarendra Bhati (twitter.com/imnarendrabhati) Suma Soft PvtPune (India) Kenneth Chew Arsenii Kostromin (0x3c3e) Abhay Kailasia @abhay_kailasia Lakshmi Narain College Of Technology BhopalBrian McNulty Offensive SecurityArsenii Kostromin (0x3c3e) Offensive SecurityJoshua Jewett @JoshJewett33 Offensive Security Offensive SecurityFrancisco Alonso @revskills PK Security PK SecurityFrancisco Alonso @revskills Jie Ding @Lime HKUS3 LabDong Jun Kim @smlijun AbyssLabJong Seong Kim @nevul37 AbyssLabzhunki 이준성(Junsung Lee) Claire Houston Anonymous Wang Yu Cyberservalw0wbox
Affected Software | Affected Version | How to fix |
---|---|---|
macOS Ventura | <13.6 | 13.6 |
Apple iOS and iPadOS | <17 | 17 |
Apple iOS, iPadOS, and macOS | <17 | 17 |
macOS | <12.7 | 12.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2023-42969 has been rated as a high-severity vulnerability due to its potential impact on sensitive information exposure.
To fix CVE-2023-42969, update affected software to macOS Ventura version 13.6 or iOS/iPadOS version 17.
CVE-2023-42969 affects macOS Ventura versions up to 13.6 and iOS/iPadOS versions up to 17.
CVE-2023-42969 addresses an accessibility issue related to the redaction of sensitive information.
Yes, the fixes for CVE-2023-42969 are included in the latest updates for macOS Ventura 13.6 and iOS/iPadOS 17.