First published: Mon Sep 18 2023(Updated: )
Accessibility. This issue was addressed with improved redaction of sensitive information.
Credit: Mohamed GHANNAM @_simo36 Tim Michaud @TimGMichaud MoveworksMickey Jin @patch1t Wojciech Reguła @_r3ggi Kirin @Pwnrin Chris Ross (Zoom) Csaba Fitzl @theevilbit Offensive SecurityLiang Wei PixiePoint Securityzer0k Adam M. Noah Roskin-Frazee Professor Jason Lau (ZeroClicks.ai Lab) Will Brattain at Trail Bits이준성(Junsung Lee) Cross RepublicKirin @Pwnrin NorthSeaZhice Yang (ShanghaiTech University) Certik Skyfall Team Antonio Zekic @antoniozekic Dataflow SecurityRon Masas ImpervaMikko Kenttälä ) @Turmio_ SensorFuCertik Skyfall Team Ant Security Lightpattern-f @pattern_F_ Ant Security LightZweig Kunlun LabFélix Poulin-Bélanger Linus Henze Pinauten GmbHPan ZhenPeng @Peterpan0927 STAR Labs SG PteMichael (Biscuit) Thomas 张师傅(@京东蓝军) Joseph Ravichandran @0xjprx MIT CSAILSei K. Zhipeng Huo @R3dF09 Tencent Security Xuanwu LabDohyun Lee @l33d0hyun PK SecurityAdam M. SecuRing SecuRingWojciech Regula SecuRingAdam M. BreakPoint Security Research BreakPoint Security ResearchRon Masas BreakPoint Security ResearchGergely Kalman @gergely_kalman weize she an anonymous researcher Berke Kırbaş Harsh Jaiswal Tomi Tokics @tomitokics iTomsn0wAdriatik Raci Sentry CybersecurityNarendra Bhati (twitter.com/imnarendrabhati) Suma Soft PvtPune (India) Kenneth Chew Yiğit Can YILMAZ @yilmazcanyigit Arsenii Kostromin (0x3c3e) Abhay Kailasia @abhay_kailasia Lakshmi Narain College Of Technology BhopalJames Hutchins Brian McNulty Offensive SecurityArsenii Kostromin (0x3c3e) Offensive SecurityJoshua Jewett @JoshJewett33 Offensive Security Offensive SecurityFrancisco Alonso @revskills PK Security PK SecurityFrancisco Alonso @revskills Jie Ding @Lime HKUS3 LabDong Jun Kim @smlijun AbyssLabJong Seong Kim @nevul37 AbyssLabzhunki 이준성(Junsung Lee) Claire Houston Anonymous Wang Yu CyberservalYe Zhang @VAR10CK Baidu Securityw0wbox product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS and iPadOS | <17 | 17 |
Apple iOS, iPadOS, and macOS | <17 | 17 |
Apple iOS, iPadOS, and macOS | =17.0 | |
iPhone OS | =17.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-42973 has been classified with a medium severity due to its potential to expose sensitive information.
To remediate CVE-2023-42973, users should update their iOS or iPadOS devices to the latest available version, specifically version 17 or later.
CVE-2023-42973 affects Apple iOS and iPadOS versions prior to 17.
CVE-2023-42973 addresses accessibility and permissions issues related to the handling of sensitive information.
Yes, CVE-2023-42973 has been resolved with improved redaction and handling protocols in recent updates.