Lucene search

K
appleAppleAPPLE:A595744BB7048FDE04F5C4FFDC9AB3AF
HistoryOct 10, 2023 - 12:00 a.m.

About the security content of iOS 16.7.1 and iPadOS 16.7.1

2023-10-1000:00:00
support.apple.com
10
ios
ipados
security updates
local attacker
privilege elevation
buffer overflow
arbitrary code execution
cve-2023-42824
cve-2023-5217

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

9.3

Confidence

High

EPSS

0.248

Percentile

96.7%

About the security content of iOS 16.7.1 and iPadOS 16.7.1

This document describes the security content of iOS 16.7.1 and iPadOS 16.7.1.

About Apple security updates

For our customers’ protection, Apple doesn’t disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available. Recent releases are listed on the Apple security releases page.

Apple security documents reference vulnerabilities by CVE-ID when possible.

For more information about security, see the Apple Product Security page.

iOS 16.7.1 and iPadOS 16.7.1

Released October 10, 2023

Kernel

Available for: iPhone 8 and later, iPad Pro (all models), iPad Air 3rd generation and later, iPad 5th generation and later, and iPad mini 5th generation and later

Impact: A local attacker may be able to elevate their privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.6.

Description: The issue was addressed with improved checks.

CVE-2023-42824

WebRTC

Available for: iPhone 8 and later, iPad Pro (all models), iPad Air 3rd generation and later, iPad 5th generation and later, and iPad mini 5th generation and later

Impact: A buffer overflow may result in arbitrary code execution

Description: The issue was addressed by updating to libvpx 1.13.1.

WebKit Bugzilla: 262365

CVE-2023-5217

Information about products not manufactured by Apple, or independent websites not controlled or tested by Apple, is provided without recommendation or endorsement. Apple assumes no responsibility with regard to the selection, performance, or use of third-party websites or products. Apple makes no representations regarding third-party website accuracy or reliability. Contact the vendor for additional information.

Published Date: November 15, 2023

Affected configurations

Vulners
Node
appletextureRange<16.7.1ios
OR
appleipadosRange<16.7.1

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

9.3

Confidence

High

EPSS

0.248

Percentile

96.7%