CVE-2023-28201
moderate-risk
Published 2023-05-08
This issue was addressed with improved state management. This issue is fixed in macOS Ventura 13.3, Safari 16.4, iOS 16.4 and iPadOS 16.4, iOS 15.7.4 and iPadOS 15.7.4, tvOS 16.4. A remote user may be able to cause unexpected app termination or arbitrary code execution.
Do I need to act?
~
2.9% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Vendors
References (10)
Vendor Advisory
https://support.apple.com/en-us/HT213670
Vendor Advisory
https://support.apple.com/en-us/HT213671
Vendor Advisory
https://support.apple.com/en-us/HT213673
Vendor Advisory
https://support.apple.com/en-us/HT213676
Vendor Advisory
https://support.apple.com/en-us/HT213670
Vendor Advisory
https://support.apple.com/en-us/HT213671
Vendor Advisory
https://support.apple.com/en-us/HT213673
Vendor Advisory
https://support.apple.com/en-us/HT213676
48
/ 100
moderate-risk
Severity
32/34 · Critical
Exploitability
6/34 · Minimal
Exposure
10/34 · Low