CWE
416 20 285
Advisory Published
CVE Published
Updated

CVE-2023-42973: Use After Free

First published: Mon Sep 18 2023(Updated: )

Accessibility. This issue was addressed with improved redaction of sensitive information.

Credit: Mohamed GHANNAM @_simo36 Tim Michaud @TimGMichaud MoveworksMickey Jin @patch1t Wojciech Reguła @_r3ggi Kirin @Pwnrin Chris Ross (Zoom) Csaba Fitzl @theevilbit Offensive SecurityLiang Wei PixiePoint Securityzer0k Adam M. Noah Roskin-Frazee Professor Jason Lau (ZeroClicks.ai Lab) Will Brattain at Trail Bits이준성(Junsung Lee) Cross RepublicKirin @Pwnrin NorthSeaZhice Yang (ShanghaiTech University) Certik Skyfall Team Antonio Zekic @antoniozekic Dataflow SecurityRon Masas ImpervaMikko Kenttälä ) @Turmio_ SensorFuCertik Skyfall Team Ant Security Lightpattern-f @pattern_F_ Ant Security LightZweig Kunlun LabFélix Poulin-Bélanger Linus Henze Pinauten GmbHPan ZhenPeng @Peterpan0927 STAR Labs SG PteMichael (Biscuit) Thomas 张师傅(@京东蓝军) Joseph Ravichandran @0xjprx MIT CSAILSei K. Zhipeng Huo @R3dF09 Tencent Security Xuanwu LabDohyun Lee @l33d0hyun PK SecurityAdam M. SecuRing SecuRingWojciech Regula SecuRingAdam M. BreakPoint Security Research BreakPoint Security ResearchRon Masas BreakPoint Security ResearchGergely Kalman @gergely_kalman weize she an anonymous researcher Berke Kırbaş Harsh Jaiswal Tomi Tokics @tomitokics iTomsn0wAdriatik Raci Sentry CybersecurityNarendra Bhati (twitter.com/imnarendrabhati) Suma Soft PvtPune (India) Kenneth Chew Yiğit Can YILMAZ @yilmazcanyigit Arsenii Kostromin (0x3c3e) Abhay Kailasia @abhay_kailasia Lakshmi Narain College Of Technology BhopalJames Hutchins Brian McNulty Offensive SecurityArsenii Kostromin (0x3c3e) Offensive SecurityJoshua Jewett @JoshJewett33 Offensive Security Offensive SecurityFrancisco Alonso @revskills PK Security PK SecurityFrancisco Alonso @revskills Jie Ding @Lime HKUS3 LabDong Jun Kim @smlijun AbyssLabJong Seong Kim @nevul37 AbyssLabzhunki 이준성(Junsung Lee) Claire Houston Anonymous Wang Yu CyberservalYe Zhang @VAR10CK Baidu Securityw0wbox product-security@apple.com

Affected SoftwareAffected VersionHow to fix
Apple iOS and iPadOS<17
17
Apple iOS, iPadOS, and macOS<17
17
Apple iOS, iPadOS, and macOS=17.0
iPhone OS=17.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is the severity of CVE-2023-42973?

    CVE-2023-42973 has been classified with a medium severity due to its potential to expose sensitive information.

  • How do I fix CVE-2023-42973?

    To remediate CVE-2023-42973, users should update their iOS or iPadOS devices to the latest available version, specifically version 17 or later.

  • What systems are affected by CVE-2023-42973?

    CVE-2023-42973 affects Apple iOS and iPadOS versions prior to 17.

  • What specific issues does CVE-2023-42973 address?

    CVE-2023-42973 addresses accessibility and permissions issues related to the handling of sensitive information.

  • Has CVE-2023-42973 been resolved in any updates?

    Yes, CVE-2023-42973 has been resolved with improved redaction and handling protocols in recent updates.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203