CVE-2023-42852

Severity

88%

Complexity

27%

Confidentiality

98%

A logic issue was addressed with improved checks. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. Processing web content may lead to arbitrary code execution.

CVSS 3.1 Base Score 8.8. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).

Overview

First reported 1 year ago

2023-10-25 19:15:00

Last updated 1 year ago

2023-12-07 20:15:00

Affected Software

Apple Safari

References

https://support.apple.com/en-us/HT213982

https://support.apple.com/en-us/HT213981

https://support.apple.com/en-us/HT213988

https://support.apple.com/en-us/HT213986

https://support.apple.com/en-us/HT213987

https://support.apple.com/en-us/HT213984

http://seclists.org/fulldisclosure/2023/Oct/23

http://seclists.org/fulldisclosure/2023/Oct/27

http://seclists.org/fulldisclosure/2023/Oct/25

http://seclists.org/fulldisclosure/2023/Oct/19

http://seclists.org/fulldisclosure/2023/Oct/24

http://seclists.org/fulldisclosure/2023/Oct/22

https://support.apple.com/en-us/HT213982

Release Notes, Vendor Advisory

https://support.apple.com/en-us/HT213981

Release Notes, Vendor Advisory

https://support.apple.com/en-us/HT213988

Release Notes, Vendor Advisory

https://support.apple.com/en-us/HT213986

Release Notes, Vendor Advisory

https://support.apple.com/en-us/HT213987

Release Notes, Vendor Advisory

https://support.apple.com/en-us/HT213984

Release Notes, Vendor Advisory

http://seclists.org/fulldisclosure/2023/Oct/23

Mailing List, Third Party Advisory

http://seclists.org/fulldisclosure/2023/Oct/27

Mailing List, Third Party Advisory

http://seclists.org/fulldisclosure/2023/Oct/25

Mailing List, Third Party Advisory

http://seclists.org/fulldisclosure/2023/Oct/19

Mailing List, Third Party Advisory

http://seclists.org/fulldisclosure/2023/Oct/24

Mailing List, Third Party Advisory

http://seclists.org/fulldisclosure/2023/Oct/22

Mailing List, Third Party Advisory

https://lists.fedoraproject.org/archives/list/[email protected]/message/ZTCZGQPRDAOPP6NK4CIDJKIPMBWD5J7K/

http://www.openwall.com/lists/oss-security/2023/11/15/1

https://www.debian.org/security/2023/dsa-5557

https://lists.fedoraproject.org/archives/list/[email protected]/message/RPPMOWFYZODONTA3RLZOKSGNR4DELGG2/

https://lists.fedoraproject.org/archives/list/[email protected]/message/S3O7ITSBZDHLBM5OG22K6RZAHRRTGECM/

https://support.apple.com/kb/HT213984

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.