CVE-2023-23499

This issue was addressed by enabling hardened runtime. This issue is fixed in macOS Monterey 12.6.3, macOS Ventura 13.2, watchOS 9.3, macOS Big Sur 11.7.3, tvOS 16.3, iOS 16.3 and iPadOS 16.3. An app may be able to access user-sensitive data.
References
Link Resource
https://support.apple.com/en-us/HT213599 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213601 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213603 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213604 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213605 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213606 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213599 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213601 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213603 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213604 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213605 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213606 Release Notes Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:46

Type Values Removed Values Added
References () https://support.apple.com/en-us/HT213599 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213599 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT213601 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213601 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT213603 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213603 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT213604 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213604 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT213605 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213605 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT213606 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213606 - Release Notes, Vendor Advisory

27 Jul 2023, 04:15

Type Values Removed Values Added
Summary This issue was addressed by enabling hardened runtime. This issue is fixed in macOS Ventura 13.2, macOS Monterey 12.6.3, tvOS 16.3, watchOS 9.3, iOS 16.3 and iPadOS 16.3, macOS Big Sur 11.7.3. An app may be able to access user-sensitive data. This issue was addressed by enabling hardened runtime. This issue is fixed in macOS Monterey 12.6.3, macOS Ventura 13.2, watchOS 9.3, macOS Big Sur 11.7.3, tvOS 16.3, iOS 16.3 and iPadOS 16.3. An app may be able to access user-sensitive data.

Information

Published : 2023-02-27 20:15

Updated : 2024-11-21 07:46


NVD link : CVE-2023-23499

Mitre link : CVE-2023-23499

CVE.ORG link : CVE-2023-23499


JSON object : View

Products Affected

apple

  • macos
  • watchos
  • iphone_os
  • ipados
  • tvos