← Volver a CVEs
CVE-2023-41061
HIGHCISA KEV7.8
Descripcion
A validation issue was addressed with improved logic. This issue is fixed in watchOS 9.6.2, iOS 16.6.1 and iPadOS 16.6.1. A maliciously crafted attachment may result in arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
Detalles CVE
Puntuacion CVSS v3.17.8
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Vector de ataqueLOCAL
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioREQUIRED
Publicado9/7/2023
Ultima modificacion10/23/2025
Fuentekev
Avistamientos honeypot0
CISA KEV
VendedorApple
ProductoiOS, iPadOS, and watchOS
Nombre vulnerabilidadApple iOS, iPadOS, and watchOS Wallet Code Execution Vulnerability
Fecha inclusion KEV2023-09-11
Fecha limite remediacion2023-10-02
Uso en ransomwareUnknown
Productos afectados
apple:ipadosapple:iphone_osapple:watchos
Debilidades (CWE)
CWE-20
Referencias
http://seclists.org/fulldisclosure/2023/Sep/4(product-security@apple.com)
http://seclists.org/fulldisclosure/2023/Sep/5(product-security@apple.com)
https://support.apple.com/en-us/HT213905(product-security@apple.com)
https://support.apple.com/en-us/HT213907(product-security@apple.com)
https://support.apple.com/kb/HT213905(product-security@apple.com)
https://support.apple.com/kb/HT213907(product-security@apple.com)
http://seclists.org/fulldisclosure/2023/Sep/4(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2023/Sep/5(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT213905(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT213907(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/kb/HT213905(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/kb/HT213907(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-41061(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.