CVE-2023-42852
high-risk
Published 2023-10-25
A logic issue was addressed with improved checks. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. Processing web content may lead to arbitrary code execution.
Do I need to act?
~
2.2% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
NETWORK
/ LOW complexity
Affected Products (9)
Affected Vendors
References (38)
Mailing List
http://seclists.org/fulldisclosure/2023/Oct/19
Mailing List
http://seclists.org/fulldisclosure/2023/Oct/22
Mailing List
http://seclists.org/fulldisclosure/2023/Oct/23
Mailing List
http://seclists.org/fulldisclosure/2023/Oct/24
Mailing List
http://seclists.org/fulldisclosure/2023/Oct/25
Mailing List
http://seclists.org/fulldisclosure/2023/Oct/27
Third Party Advisory
https://security.gentoo.org/glsa/202401-33
Release Notes
https://support.apple.com/en-us/HT213981
Release Notes
https://support.apple.com/en-us/HT213982
Release Notes
https://support.apple.com/en-us/HT213984
Release Notes
https://support.apple.com/en-us/HT213986
Release Notes
https://support.apple.com/en-us/HT213987
Release Notes
https://support.apple.com/en-us/HT213988
Third Party Advisory
https://support.apple.com/kb/HT213984
Third Party Advisory
https://www.debian.org/security/2023/dsa-5557
Mailing List
http://seclists.org/fulldisclosure/2023/Oct/19
and 18 more references
50
/ 100
high-risk
Severity
30/34 · Critical
Exploitability
5/34 · Minimal
Exposure
15/34 · Moderate