CVE-2023-42853
low-risk
Published 2024-02-21
A logic issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.1, macOS Monterey 12.7.1, macOS Ventura 13.6.1. An app may be able to access user-sensitive data.
Do I need to act?
-
0.02% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.5/10
Medium
LOCAL
/ LOW complexity
Affected Vendors
References (13)
Mailing List
http://seclists.org/fulldisclosure/2024/Mar/21
Vendor Advisory
https://support.apple.com/en-us/HT213983
Vendor Advisory
https://support.apple.com/en-us/HT213984
Vendor Advisory
https://support.apple.com/en-us/HT213985
Vendor Advisory
https://support.apple.com/kb/HT214084
Mailing List
http://seclists.org/fulldisclosure/2024/Mar/21
Vendor Advisory
https://support.apple.com/en-us/HT213983
Vendor Advisory
https://support.apple.com/en-us/HT213984
Vendor Advisory
https://support.apple.com/en-us/HT213985
Vendor Advisory
https://support.apple.com/kb/HT214084
25
/ 100
low-risk
Severity
18/34 · Moderate
Exploitability
0/34 · Minimal
Exposure
7/34 · Low