← Volver a CVEs
CVE-2023-37450
HIGHCISA KEV8.8
Descripcion
The issue was addressed with improved checks. This issue is fixed in iOS 16.6 and iPadOS 16.6, Safari 16.5.2, tvOS 16.6, macOS Ventura 13.5, watchOS 9.6. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
Detalles CVE
Puntuacion CVSS v3.18.8
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioREQUIRED
Publicado7/27/2023
Ultima modificacion10/23/2025
Fuentekev
Avistamientos honeypot0
CISA KEV
VendedorApple
ProductoMultiple Products
Nombre vulnerabilidadApple Multiple Products WebKit Code Execution Vulnerability
Fecha inclusion KEV2023-07-13
Fecha limite remediacion2023-08-03
Uso en ransomwareUnknown
Productos afectados
apple:ipadosapple:iphone_osapple:macosapple:safariapple:tvosapple:watchoswebkitgtk:webkitgtk\+
Referencias
https://security.gentoo.org/glsa/202401-04(product-security@apple.com)
https://support.apple.com/en-us/HT213826(product-security@apple.com)
https://support.apple.com/en-us/HT213841(product-security@apple.com)
https://support.apple.com/en-us/HT213843(product-security@apple.com)
https://support.apple.com/en-us/HT213846(product-security@apple.com)
https://support.apple.com/en-us/HT213848(product-security@apple.com)
https://security.gentoo.org/glsa/202401-04(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT213826(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT213841(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT213843(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT213846(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT213848(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-37450(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.