CWE
416 20
Advisory Published
Updated

CVE-2023-42970: Use After Free

First published: Mon Sep 18 2023(Updated: )

Accessibility. This issue was addressed with improved redaction of sensitive information.

Credit: Csaba Fitzl @theevilbit Offensive Securityzer0k Adam M. Noah Roskin-Frazee Professor Jason Lau (ZeroClicks.ai Lab) Will Brattain at Trail Bits이준성(Junsung Lee) Cross RepublicKirin @Pwnrin NorthSeaMickey Jin @patch1t Certik Skyfall Team Linus Henze Pinauten GmbHPan ZhenPeng @Peterpan0927 STAR Labs SG PteMichael (Biscuit) Thomas 张师傅(@京东蓝军) Sei K. Zhipeng Huo @R3dF09 Tencent Security Xuanwu LabDohyun Lee @l33d0hyun PK SecurityAdam M. SecuRing SecuRingWojciech Regula SecuRingAdam M. BreakPoint Security Research BreakPoint Security ResearchRon Masas BreakPoint Security Researchserkan Gurbuz Kirin @Pwnrin Adriatik Raci Sentry CybersecurityNarendra Bhati (twitter.com/imnarendrabhati) Suma Soft PvtPune (India) Yiğit Can YILMAZ @yilmazcanyigit Arsenii Kostromin (0x3c3e) James Hutchins Arsenii Kostromin (0x3c3e) Offensive SecurityJoshua Jewett @JoshJewett33 Offensive Security Offensive SecurityFrancisco Alonso @revskills PK Security PK SecurityFrancisco Alonso @revskills Jie Ding @Lime HKUS3 LabDong Jun Kim @smlijun AbyssLabJong Seong Kim @nevul37 AbyssLabzhunki 이준성(Junsung Lee) Mohamed GHANNAM @_simo36 Tim Michaud @TimGMichaud MoveworksAntonio Zekic @antoniozekic Dataflow Securityw0wbox Ye Zhang @VAR10CK Baidu SecurityWojciech Reguła @_r3ggi Chris Ross (Zoom) Liang Wei PixiePoint SecurityZhice Yang (ShanghaiTech University) Ron Masas ImpervaMikko Kenttälä ) @Turmio_ SensorFuCertik Skyfall Team Ant Security Lightpattern-f @pattern_F_ Ant Security LightZweig Kunlun LabFélix Poulin-Bélanger Joseph Ravichandran @0xjprx MIT CSAILGergely Kalman @gergely_kalman weize she an anonymous researcher Berke Kırbaş Harsh Jaiswal Tomi Tokics @tomitokics iTomsn0wKenneth Chew Abhay Kailasia @abhay_kailasia Lakshmi Narain College Of Technology BhopalBrian McNulty Offensive SecurityClaire Houston Anonymous Wang Yu Cyberserval

Affected SoftwareAffected VersionHow to fix
Apple iOS, iPadOS, and watchOS<10
10
tvOS<17
17
Apple iOS and iPadOS<17
17
Apple iOS, iPadOS, and macOS<17
17

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is the severity of CVE-2023-42970?

    CVE-2023-42970 has been assessed with a critical severity level due to its potential impact on sensitive information redaction.

  • How do I fix CVE-2023-42970?

    To fix CVE-2023-42970, users should update their affected Apple devices to the latest version of iOS, iPadOS, watchOS, or tvOS as recommended by Apple.

  • What systems are affected by CVE-2023-42970?

    CVE-2023-42970 affects several Apple systems including watchOS versions below 10 and iOS and iPadOS versions below 17.

  • What are the potential impacts of CVE-2023-42970?

    The potential impacts of CVE-2023-42970 include unauthorized access to sensitive information due to a permissions issue on affected Apple devices.

  • Is there any known exploitation of CVE-2023-42970?

    As of now, there are no reports of known exploitation for CVE-2023-42970 in the wild, but users are advised to update their software to mitigate risks.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203