← Zuruck zu CVEs
CVE-2023-37450
HIGHCISA KEV8.8
Beschreibung
The issue was addressed with improved checks. This issue is fixed in iOS 16.6 and iPadOS 16.6, Safari 16.5.2, tvOS 16.6, macOS Ventura 13.5, watchOS 9.6. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
CVE Details
CVSS v3.1 Bewertung8.8
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionREQUIRED
Veroffentlicht7/27/2023
Zuletzt geandert10/23/2025
Quellekev
Honeypot-Sichtungen0
CISA KEV
HerstellerApple
ProduktMultiple Products
SchwachstellennameApple Multiple Products WebKit Code Execution Vulnerability
KEV Aufnahmedatum2023-07-13
Behebungsfrist2023-08-03
Ransomware-NutzungUnknown
Betroffene Produkte
apple:ipadosapple:iphone_osapple:macosapple:safariapple:tvosapple:watchoswebkitgtk:webkitgtk\+
Referenzen
https://security.gentoo.org/glsa/202401-04(product-security@apple.com)
https://support.apple.com/en-us/HT213826(product-security@apple.com)
https://support.apple.com/en-us/HT213841(product-security@apple.com)
https://support.apple.com/en-us/HT213843(product-security@apple.com)
https://support.apple.com/en-us/HT213846(product-security@apple.com)
https://support.apple.com/en-us/HT213848(product-security@apple.com)
https://security.gentoo.org/glsa/202401-04(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT213826(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT213841(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT213843(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT213846(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT213848(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-37450(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.