CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
46.6%
The issue was addressed with improved memory handling. This issue is fixed in watchOS 10.3, tvOS 17.3, iOS 17.3 and iPadOS 17.3, macOS Sonoma 14.3, iOS 16.7.5 and iPadOS 16.7.5, Safari 17.3. Processing web content may lead to arbitrary code execution.
Vendor | Product | Version | CPE |
---|---|---|---|
apple | safari | * | cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* |
apple | ipados | * | cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* |
apple | iphone_os | * | cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* |
apple | macos | * | cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* |
apple | tvos | * | cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* |
apple | watchos | * | cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* |
[
{
"vendor": "Apple",
"product": "iOS and iPadOS",
"versions": [
{
"version": "unspecified",
"status": "affected",
"lessThan": "17.3",
"versionType": "custom"
}
]
},
{
"vendor": "Apple",
"product": "iOS and iPadOS",
"versions": [
{
"version": "unspecified",
"status": "affected",
"lessThan": "16.7",
"versionType": "custom"
}
]
},
{
"vendor": "Apple",
"product": "tvOS",
"versions": [
{
"version": "unspecified",
"status": "affected",
"lessThan": "17.3",
"versionType": "custom"
}
]
},
{
"vendor": "Apple",
"product": "Safari",
"versions": [
{
"version": "unspecified",
"status": "affected",
"lessThan": "17.3",
"versionType": "custom"
}
]
},
{
"vendor": "Apple",
"product": "watchOS",
"versions": [
{
"version": "unspecified",
"status": "affected",
"lessThan": "10.3",
"versionType": "custom"
}
]
},
{
"vendor": "Apple",
"product": "macOS",
"versions": [
{
"version": "unspecified",
"status": "affected",
"lessThan": "14.3",
"versionType": "custom"
}
]
}
]
seclists.org/fulldisclosure/2024/Jan/27
seclists.org/fulldisclosure/2024/Jan/33
seclists.org/fulldisclosure/2024/Jan/34
seclists.org/fulldisclosure/2024/Jan/36
seclists.org/fulldisclosure/2024/Jan/39
seclists.org/fulldisclosure/2024/Jan/40
www.openwall.com/lists/oss-security/2024/02/05/8
lists.fedoraproject.org/archives/list/[email protected]/message/US43EQFC2IS66EA2CPAZFH2RQ6WD7PKF/
lists.fedoraproject.org/archives/list/[email protected]/message/X2VJMEDT4GL42AQVHSYOT6DIVJDZWIV4/
support.apple.com/en-us/HT214055
support.apple.com/en-us/HT214056
support.apple.com/en-us/HT214059
support.apple.com/en-us/HT214060
support.apple.com/en-us/HT214061
support.apple.com/en-us/HT214063
support.apple.com/kb/HT214055
support.apple.com/kb/HT214056
support.apple.com/kb/HT214059
support.apple.com/kb/HT214060
support.apple.com/kb/HT214061
support.apple.com/kb/HT214063
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
46.6%