First published: Mon Sep 18 2023(Updated: )
Accessibility. This issue was addressed with improved redaction of sensitive information.
Credit: Csaba Fitzl @theevilbit Offensive Securityzer0k Adam M. Noah Roskin-Frazee Professor Jason Lau (ZeroClicks.ai Lab) Will Brattain at Trail Bits이준성(Junsung Lee) Cross RepublicKirin @Pwnrin NorthSeaMickey Jin @patch1t Certik Skyfall Team Linus Henze Pinauten GmbHPan ZhenPeng @Peterpan0927 STAR Labs SG PteMichael (Biscuit) Thomas 张师傅(@京东蓝军) Sei K. Zhipeng Huo @R3dF09 Tencent Security Xuanwu LabDohyun Lee @l33d0hyun PK SecurityAdam M. SecuRing SecuRingWojciech Regula SecuRingAdam M. BreakPoint Security Research BreakPoint Security ResearchRon Masas BreakPoint Security Researchserkan Gurbuz Kirin @Pwnrin Adriatik Raci Sentry CybersecurityNarendra Bhati (twitter.com/imnarendrabhati) Suma Soft PvtPune (India) Yiğit Can YILMAZ @yilmazcanyigit Arsenii Kostromin (0x3c3e) James Hutchins Arsenii Kostromin (0x3c3e) Offensive SecurityJoshua Jewett @JoshJewett33 Offensive Security Offensive SecurityFrancisco Alonso @revskills PK Security PK SecurityFrancisco Alonso @revskills Jie Ding @Lime HKUS3 LabDong Jun Kim @smlijun AbyssLabJong Seong Kim @nevul37 AbyssLabzhunki 이준성(Junsung Lee) Mohamed GHANNAM @_simo36 Tim Michaud @TimGMichaud MoveworksAntonio Zekic @antoniozekic Dataflow Securityw0wbox Ye Zhang @VAR10CK Baidu SecurityWojciech Reguła @_r3ggi Chris Ross (Zoom) Liang Wei PixiePoint SecurityZhice Yang (ShanghaiTech University) Ron Masas ImpervaMikko Kenttälä ) @Turmio_ SensorFuCertik Skyfall Team Ant Security Lightpattern-f @pattern_F_ Ant Security LightZweig Kunlun LabFélix Poulin-Bélanger Joseph Ravichandran @0xjprx MIT CSAILGergely Kalman @gergely_kalman weize she an anonymous researcher Berke Kırbaş Harsh Jaiswal Tomi Tokics @tomitokics iTomsn0wKenneth Chew Abhay Kailasia @abhay_kailasia Lakshmi Narain College Of Technology BhopalBrian McNulty Offensive SecurityClaire Houston Anonymous Wang Yu Cyberserval
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS, iPadOS, and watchOS | <10 | 10 |
tvOS | <17 | 17 |
Apple iOS and iPadOS | <17 | 17 |
Apple iOS, iPadOS, and macOS | <17 | 17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2023-42970 has been assessed with a critical severity level due to its potential impact on sensitive information redaction.
To fix CVE-2023-42970, users should update their affected Apple devices to the latest version of iOS, iPadOS, watchOS, or tvOS as recommended by Apple.
CVE-2023-42970 affects several Apple systems including watchOS versions below 10 and iOS and iPadOS versions below 17.
The potential impacts of CVE-2023-42970 include unauthorized access to sensitive information due to a permissions issue on affected Apple devices.
As of now, there are no reports of known exploitation for CVE-2023-42970 in the wild, but users are advised to update their software to mitigate risks.