← Retour aux CVEs
CVE-2023-37450
HIGHCISA KEV8.8
Description
The issue was addressed with improved checks. This issue is fixed in iOS 16.6 and iPadOS 16.6, Safari 16.5.2, tvOS 16.6, macOS Ventura 13.5, watchOS 9.6. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
Details CVE
Score CVSS v3.18.8
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurREQUIRED
Publie7/27/2023
Derniere modification10/23/2025
Sourcekev
Observations honeypot0
CISA KEV
FournisseurApple
ProduitMultiple Products
Nom vulnerabiliteApple Multiple Products WebKit Code Execution Vulnerability
Date ajout KEV2023-07-13
Date limite remediation2023-08-03
Utilise dans ransomwareUnknown
Produits affectes
apple:ipadosapple:iphone_osapple:macosapple:safariapple:tvosapple:watchoswebkitgtk:webkitgtk\+
References
https://security.gentoo.org/glsa/202401-04(product-security@apple.com)
https://support.apple.com/en-us/HT213826(product-security@apple.com)
https://support.apple.com/en-us/HT213841(product-security@apple.com)
https://support.apple.com/en-us/HT213843(product-security@apple.com)
https://support.apple.com/en-us/HT213846(product-security@apple.com)
https://support.apple.com/en-us/HT213848(product-security@apple.com)
https://security.gentoo.org/glsa/202401-04(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT213826(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT213841(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT213843(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT213846(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT213848(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-37450(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.