CVE-2023-41993

The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
cpe:2.3:a:oracle:jdk:1.8.0:update401:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.8.0:update401:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:a:netapp:cloud_insights_acquisition_unit:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:cloud_insights_storage_workload_security_agent:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*

Configuration 6 (hide)

cpe:2.3:a:webkitgtk:webkitgtk\+:*:*:*:*:*:*:*:*

History

03 Sep 2024, 20:19

Type Values Removed Values Added
First Time Webkitgtk
Webkitgtk webkitgtk\+
CPE cpe:2.3:a:webkitgtk:webkitgtk\+:*:*:*:*:*:*:*:*

14 Aug 2024, 15:28

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 9.8
v2 : unknown
v3 : 8.8

23 May 2024, 17:51

Type Values Removed Values Added
CPE cpe:2.3:o:apple:iphone_os:17.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:17.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.8.0:update401:*:*:*:*:*:*
cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
cpe:2.3:a:oracle:jre:1.8.0:update401:*:*:*:*:*:*
cpe:2.3:a:netapp:cloud_insights_storage_workload_security_agent:-:*:*:*:*:*:*:*
cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
cpe:2.3:a:netapp:cloud_insights_acquisition_unit:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
References () https://security.gentoo.org/glsa/202401-33 - () https://security.gentoo.org/glsa/202401-33 - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20240426-0004/ - () https://security.netapp.com/advisory/ntap-20240426-0004/ - Third Party Advisory
First Time Netapp
Netapp oncommand Workflow Automation
Oracle jre
Netapp cloud Insights Storage Workload Security Agent
Oracle graalvm
Oracle
Oracle jdk
Netapp oncommand Insight
Netapp cloud Insights Acquisition Unit

26 Apr 2024, 09:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20240426-0004/ -

31 Jan 2024, 15:15

Type Values Removed Values Added
References
  • () https://security.gentoo.org/glsa/202401-33 -

23 Jan 2024, 01:15

Type Values Removed Values Added
References
  • {'url': 'https://support.apple.com/en-us/HT213927', 'name': 'https://support.apple.com/en-us/HT213927', 'tags': ['Release Notes', 'Vendor Advisory'], 'refsource': 'MISC'}
  • {'url': 'https://support.apple.com/en-us/HT213941', 'name': 'https://support.apple.com/en-us/HT213941', 'tags': ['Release Notes', 'Vendor Advisory'], 'refsource': 'MISC'}
Summary The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14, Safari 17, iOS 16.7 and iPadOS 16.7. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7. The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7.

10 Jan 2024, 22:15

Type Values Removed Values Added
References
  • {'url': 'https://support.apple.com/kb/HT213926', 'name': 'https://support.apple.com/kb/HT213926', 'tags': [], 'refsource': ''}
  • {'url': 'http://seclists.org/fulldisclosure/2023/Oct/3', 'name': 'http://seclists.org/fulldisclosure/2023/Oct/3', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MISC'}
  • {'url': 'https://support.apple.com/kb/HT213930', 'name': 'https://support.apple.com/kb/HT213930', 'tags': [], 'refsource': ''}
  • {'url': 'https://www.debian.org/security/2023/dsa-5527', 'name': 'https://www.debian.org/security/2023/dsa-5527', 'tags': ['Third Party Advisory'], 'refsource': 'MISC'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EYRHTFVN6FTXLZ27IPTNRSXKBAR2SOMA/', 'name': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EYRHTFVN6FTXLZ27IPTNRSXKBAR2SOMA/', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MISC'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EEMDC5TQAANFH5D77QM34ZTUKXPFGVL/', 'name': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EEMDC5TQAANFH5D77QM34ZTUKXPFGVL/', 'tags': ['Mailing List'], 'refsource': 'MISC'}
  • {'url': 'http://www.openwall.com/lists/oss-security/2023/09/28/3', 'name': 'http://www.openwall.com/lists/oss-security/2023/09/28/3', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MISC'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ELXBV26Q54BIOVN5LBCJFM2G6VQZ7FO/', 'name': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ELXBV26Q54BIOVN5LBCJFM2G6VQZ7FO/', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MISC'}
  • {'url': 'http://seclists.org/fulldisclosure/2023/Oct/4', 'name': 'http://seclists.org/fulldisclosure/2023/Oct/4', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MISC'}
  • {'url': 'http://seclists.org/fulldisclosure/2023/Oct/2', 'name': 'http://seclists.org/fulldisclosure/2023/Oct/2', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MISC'}
Summary The issue was addressed with improved checks. This issue is fixed in Safari 17, iOS 16.7 and iPadOS 16.7, macOS Sonoma 14. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7. The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14, Safari 17, iOS 16.7 and iPadOS 16.7. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7.

21 Dec 2023, 22:15

Type Values Removed Values Added
References
  • () https://support.apple.com/kb/HT213930 -

16 Nov 2023, 03:15

Type Values Removed Values Added
References
  • () https://support.apple.com/kb/HT213926 -

23 Oct 2023, 18:17

Type Values Removed Values Added
References (MISC) https://www.debian.org/security/2023/dsa-5527 - (MISC) https://www.debian.org/security/2023/dsa-5527 - Third Party Advisory
References (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EEMDC5TQAANFH5D77QM34ZTUKXPFGVL/ - (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EEMDC5TQAANFH5D77QM34ZTUKXPFGVL/ - Mailing List
CPE cpe:2.3:o:apple:iphone_os:17.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:17.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
First Time Debian debian Linux
Debian

14 Oct 2023, 03:15

Type Values Removed Values Added
References
  • (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EEMDC5TQAANFH5D77QM34ZTUKXPFGVL/ -

13 Oct 2023, 02:15

Type Values Removed Values Added
References
  • (MISC) https://www.debian.org/security/2023/dsa-5527 -

12 Oct 2023, 02:42

Type Values Removed Values Added
CPE cpe:2.3:o:apple:iphone_os:17.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipad_os:17.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
First Time Fedoraproject
Apple ipados
Apple macos
Fedoraproject fedora
References (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ELXBV26Q54BIOVN5LBCJFM2G6VQZ7FO/ - (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ELXBV26Q54BIOVN5LBCJFM2G6VQZ7FO/ - Mailing List, Third Party Advisory
References (MISC) https://support.apple.com/en-us/HT213927 - Vendor Advisory (MISC) https://support.apple.com/en-us/HT213927 - Release Notes, Vendor Advisory
References (MISC) http://seclists.org/fulldisclosure/2023/Oct/3 - (MISC) http://seclists.org/fulldisclosure/2023/Oct/3 - Mailing List, Third Party Advisory
References (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EYRHTFVN6FTXLZ27IPTNRSXKBAR2SOMA/ - (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EYRHTFVN6FTXLZ27IPTNRSXKBAR2SOMA/ - Mailing List, Third Party Advisory
References (MISC) http://seclists.org/fulldisclosure/2023/Oct/2 - (MISC) http://seclists.org/fulldisclosure/2023/Oct/2 - Mailing List, Third Party Advisory
References (MISC) https://support.apple.com/en-us/HT213940 - (MISC) https://support.apple.com/en-us/HT213940 - Release Notes, Vendor Advisory
References (MISC) http://www.openwall.com/lists/oss-security/2023/09/28/3 - (MISC) http://www.openwall.com/lists/oss-security/2023/09/28/3 - Mailing List, Third Party Advisory
References (MISC) http://seclists.org/fulldisclosure/2023/Oct/4 - (MISC) http://seclists.org/fulldisclosure/2023/Oct/4 - Mailing List, Third Party Advisory
References (MISC) https://support.apple.com/en-us/HT213941 - (MISC) https://support.apple.com/en-us/HT213941 - Release Notes, Vendor Advisory

03 Oct 2023, 06:15

Type Values Removed Values Added
References
  • (MISC) http://seclists.org/fulldisclosure/2023/Oct/2 -
  • (MISC) http://seclists.org/fulldisclosure/2023/Oct/4 -
  • (MISC) http://seclists.org/fulldisclosure/2023/Oct/3 -

01 Oct 2023, 06:15

Type Values Removed Values Added
References
  • (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ELXBV26Q54BIOVN5LBCJFM2G6VQZ7FO/ -

30 Sep 2023, 06:15

Type Values Removed Values Added
References
  • (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EYRHTFVN6FTXLZ27IPTNRSXKBAR2SOMA/ -

28 Sep 2023, 15:15

Type Values Removed Values Added
References
  • (MISC) http://www.openwall.com/lists/oss-security/2023/09/28/3 -

27 Sep 2023, 15:19

Type Values Removed Values Added
Summary The issue was addressed with improved checks. This issue is fixed in iOS 16.7 and iPadOS 16.7, iOS 17.0.1 and iPadOS 17.0.1, Safari 16.6.1. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7. The issue was addressed with improved checks. This issue is fixed in Safari 17, iOS 16.7 and iPadOS 16.7, macOS Sonoma 14. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7.
References
  • {'url': 'https://support.apple.com/en-us/HT213926', 'name': 'https://support.apple.com/en-us/HT213926', 'tags': ['Vendor Advisory'], 'refsource': 'MISC'}
  • {'url': 'https://support.apple.com/en-us/HT213930', 'name': 'https://support.apple.com/en-us/HT213930', 'tags': ['Vendor Advisory'], 'refsource': 'MISC'}
  • {'url': 'http://seclists.org/fulldisclosure/2023/Sep/15', 'name': 'http://seclists.org/fulldisclosure/2023/Sep/15', 'tags': ['Third Party Advisory'], 'refsource': 'MISC'}
  • {'url': 'http://seclists.org/fulldisclosure/2023/Sep/14', 'name': 'http://seclists.org/fulldisclosure/2023/Sep/14', 'tags': ['Third Party Advisory'], 'refsource': 'MISC'}
  • {'url': 'http://seclists.org/fulldisclosure/2023/Sep/13', 'name': 'http://seclists.org/fulldisclosure/2023/Sep/13', 'tags': ['Third Party Advisory'], 'refsource': 'MISC'}
  • {'url': 'http://seclists.org/fulldisclosure/2023/Sep/19', 'name': 'http://seclists.org/fulldisclosure/2023/Sep/19', 'tags': ['Third Party Advisory'], 'refsource': 'MISC'}
  • (MISC) https://support.apple.com/en-us/HT213940 -
  • (MISC) https://support.apple.com/en-us/HT213941 -

25 Sep 2023, 16:47

Type Values Removed Values Added
First Time Apple safari
Apple
Apple iphone Os
Apple ipad Os
CWE CWE-754
References (MISC) https://support.apple.com/en-us/HT213926 - (MISC) https://support.apple.com/en-us/HT213926 - Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT213930 - (MISC) https://support.apple.com/en-us/HT213930 - Vendor Advisory
References (MISC) http://seclists.org/fulldisclosure/2023/Sep/15 - (MISC) http://seclists.org/fulldisclosure/2023/Sep/15 - Third Party Advisory
References (MISC) https://support.apple.com/en-us/HT213927 - (MISC) https://support.apple.com/en-us/HT213927 - Vendor Advisory
References (MISC) http://seclists.org/fulldisclosure/2023/Sep/14 - (MISC) http://seclists.org/fulldisclosure/2023/Sep/14 - Third Party Advisory
References (MISC) http://seclists.org/fulldisclosure/2023/Sep/13 - (MISC) http://seclists.org/fulldisclosure/2023/Sep/13 - Third Party Advisory
References (MISC) http://seclists.org/fulldisclosure/2023/Sep/19 - (MISC) http://seclists.org/fulldisclosure/2023/Sep/19 - Third Party Advisory
CPE cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:17.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipad_os:17.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

23 Sep 2023, 03:15

Type Values Removed Values Added
References
  • (MISC) http://seclists.org/fulldisclosure/2023/Sep/14 -
  • (MISC) http://seclists.org/fulldisclosure/2023/Sep/15 -
  • (MISC) http://seclists.org/fulldisclosure/2023/Sep/19 -
  • (MISC) http://seclists.org/fulldisclosure/2023/Sep/13 -

22 Sep 2023, 06:15

Type Values Removed Values Added
References
  • {'url': 'https://support.apple.com/en-us/HT213931', 'name': 'https://support.apple.com/en-us/HT213931', 'tags': [], 'refsource': 'MISC'}
Summary The issue was addressed with improved checks. This issue is fixed in Safari 16.6.1, macOS Ventura 13.6, OS 17.0.1 and iPadOS 17.0.1, iOS 16.7 and iPadOS 16.7. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7. The issue was addressed with improved checks. This issue is fixed in iOS 16.7 and iPadOS 16.7, iOS 17.0.1 and iPadOS 17.0.1, Safari 16.6.1. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7.

21 Sep 2023, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-21 19:15

Updated : 2024-09-03 20:19


NVD link : CVE-2023-41993

Mitre link : CVE-2023-41993

CVE.ORG link : CVE-2023-41993


JSON object : View

Products Affected

netapp

  • cloud_insights_storage_workload_security_agent
  • oncommand_insight
  • cloud_insights_acquisition_unit
  • oncommand_workflow_automation

oracle

  • jdk
  • graalvm
  • jre

apple

  • ipados
  • iphone_os
  • macos

fedoraproject

  • fedora

debian

  • debian_linux

webkitgtk

  • webkitgtk\+
CWE
CWE-754

Improper Check for Unusual or Exceptional Conditions