First published: Mon Jan 22 2024(Updated: )
A timing side-channel issue was addressed with improvements to constant-time computation in cryptographic functions. This issue is fixed in macOS Sonoma 14.3, watchOS 10.3, tvOS 17.3, iOS 17.3 and iPadOS 17.3. An attacker may be able to decrypt legacy RSA PKCS#1 v1.5 ciphertexts without having the private key.
Credit: Clemens Lang Clemens Lang Clemens Lang Clemens Lang product-security@apple.com Clemens Lang Clemens Lang Clemens Lang
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS | <16.7.6 | 16.7.6 |
Apple iPadOS | <16.7.6 | 16.7.6 |
Apple tvOS | <17.3 | 17.3 |
Apple macOS Sonoma | <14.3 | 14.3 |
Apple watchOS | <10.3 | 10.3 |
Apple iOS | <17.3 | 17.3 |
Apple iPadOS | <17.3 | 17.3 |
Apple macOS Monterey | <12.7.4 | 12.7.4 |
Apple macOS Ventura | <13.6.5 | 13.6.5 |
<17.3 | ||
<17.3 | ||
>=14.0<14.3 | ||
<17.3 | ||
<10.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)