Apple Products Multiple Vulnerabilities
RISK: Extremely High Risk
TYPE: Operating Systems - Mobile & Apps
Multiple vulnerabilities were identified in Apple Products. A remote attacker could exploit some of these vulnerabilities to trigger elevation of privilege, remote code execution and security restriction bypass on the targeted system.
Note:
For CVE-2023-41991, a malicious app may be able to bypass signature validation. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7.
For CVE-2023-41992, a local attacker may be able to elevate their privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7.
For CVE-2023-41993, processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7.
Impact
- Remote Code Execution
- Elevation of Privilege
- Security Restriction Bypass
System / Technologies affected
- Versions prior to Safari 16.6.1
- Versions prior to iOS 17.0.1 and iPadOS 17.0.1
- Versions prior to iOS 16.7 and iPadOS 16.7
- Versions prior to watchOS 10.0.1
- Versions prior to watchOS 9.6.3
- Versions prior to macOS Ventura 13.6
- Versions prior to macOS Monterey 12.7
Solutions
Before installation of the software, please visit the vendor web-site for more details.
Apply fixes issued by the vendor:
- Safari 16.6.1
- iOS 17.0.1 and iPadOS 17.0.1
- iOS 16.7 and iPadOS 16.7
- watchOS 10.0.1
- watchOS 9.6.3
- macOS Ventura 13.6
- macOS Monterey 12.7
Vulnerability Identifier
Source
Related Link
Related Tags
Share with