← Voltar para CVEs
CVE-2023-37450
HIGHCISA KEV8.8
Descricao
The issue was addressed with improved checks. This issue is fixed in iOS 16.6 and iPadOS 16.6, Safari 16.5.2, tvOS 16.6, macOS Ventura 13.5, watchOS 9.6. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
Detalhes CVE
Pontuacao CVSS v3.18.8
SeveridadeHIGH
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioREQUIRED
Publicado7/27/2023
Ultima modificacao10/23/2025
Fontekev
Avistamentos honeypot0
CISA KEV
FornecedorApple
ProdutoMultiple Products
Nome da vulnerabilidadeApple Multiple Products WebKit Code Execution Vulnerability
Data inclusao KEV2023-07-13
Prazo de remediacao2023-08-03
Uso em ransomwareUnknown
Produtos afetados
apple:ipadosapple:iphone_osapple:macosapple:safariapple:tvosapple:watchoswebkitgtk:webkitgtk\+
Referencias
https://security.gentoo.org/glsa/202401-04(product-security@apple.com)
https://support.apple.com/en-us/HT213826(product-security@apple.com)
https://support.apple.com/en-us/HT213841(product-security@apple.com)
https://support.apple.com/en-us/HT213843(product-security@apple.com)
https://support.apple.com/en-us/HT213846(product-security@apple.com)
https://support.apple.com/en-us/HT213848(product-security@apple.com)
https://security.gentoo.org/glsa/202401-04(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT213826(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT213841(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT213843(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT213846(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/en-us/HT213848(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-37450(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.