CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
43.2%
An access issue was addressed with improved access restrictions. This issue is fixed in watchOS 10.3, tvOS 17.3, iOS 17.3 and iPadOS 17.3, macOS Sonoma 14.3, iOS 16.7.5 and iPadOS 16.7.5, Safari 17.3. A maliciously crafted webpage may be able to fingerprint the user.
Vendor | Product | Version | CPE |
---|---|---|---|
apple | safari | * | cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* |
apple | ipados | * | cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* |
apple | iphone_os | * | cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* |
apple | macos | * | cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* |
apple | tvos | * | cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* |
apple | watchos | * | cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* |
[
{
"vendor": "Apple",
"product": "iOS and iPadOS",
"versions": [
{
"version": "unspecified",
"status": "affected",
"lessThan": "17.3",
"versionType": "custom"
}
]
},
{
"vendor": "Apple",
"product": "iOS and iPadOS",
"versions": [
{
"version": "unspecified",
"status": "affected",
"lessThan": "16.7",
"versionType": "custom"
}
]
},
{
"vendor": "Apple",
"product": "tvOS",
"versions": [
{
"version": "unspecified",
"status": "affected",
"lessThan": "17.3",
"versionType": "custom"
}
]
},
{
"vendor": "Apple",
"product": "Safari",
"versions": [
{
"version": "unspecified",
"status": "affected",
"lessThan": "17.3",
"versionType": "custom"
}
]
},
{
"vendor": "Apple",
"product": "watchOS",
"versions": [
{
"version": "unspecified",
"status": "affected",
"lessThan": "10.3",
"versionType": "custom"
}
]
},
{
"vendor": "Apple",
"product": "macOS",
"versions": [
{
"version": "unspecified",
"status": "affected",
"lessThan": "14.3",
"versionType": "custom"
}
]
}
]
seclists.org/fulldisclosure/2024/Jan/27
seclists.org/fulldisclosure/2024/Jan/33
seclists.org/fulldisclosure/2024/Jan/34
seclists.org/fulldisclosure/2024/Jan/36
seclists.org/fulldisclosure/2024/Jan/39
seclists.org/fulldisclosure/2024/Jan/40
www.openwall.com/lists/oss-security/2024/02/05/8
lists.fedoraproject.org/archives/list/[email protected]/message/US43EQFC2IS66EA2CPAZFH2RQ6WD7PKF/
lists.fedoraproject.org/archives/list/[email protected]/message/X2VJMEDT4GL42AQVHSYOT6DIVJDZWIV4/
support.apple.com/en-us/HT214055
support.apple.com/en-us/HT214056
support.apple.com/en-us/HT214059
support.apple.com/en-us/HT214060
support.apple.com/en-us/HT214061
support.apple.com/en-us/HT214063
support.apple.com/kb/HT214055
support.apple.com/kb/HT214056
support.apple.com/kb/HT214059
support.apple.com/kb/HT214060
support.apple.com/kb/HT214061
support.apple.com/kb/HT214063
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
43.2%