Lucene search

K
nvd[email protected]NVD:CVE-2023-38606
HistoryJul 27, 2023 - 12:15 a.m.

CVE-2023-38606

2023-07-2700:15:16
web.nvd.nist.gov
8
cve-2023-38606
macos monterey
ios 15.7.8
ipados 15.7.8
macos big sur
ios 16.6
ipados 16.6
tvos 16.6
macos ventura 13.5
watchos 9.6
kernel state
actively exploited

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

AI Score

4.7

Confidence

High

EPSS

0.003

Percentile

66.6%

This issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.6.8, iOS 15.7.8 and iPadOS 15.7.8, iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Big Sur 11.7.9, macOS Ventura 13.5, watchOS 9.6. An app may be able to modify sensitive kernel state. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.1.

Affected configurations

Nvd
Node
appleipadosRange<15.7.8
OR
appleipadosRange16.016.6
OR
appleiphone_osRange<15.7.8
OR
appleiphone_osRange16.016.6
OR
applemacosRange11.011.7.9
OR
applemacosRange12.0.012.6.8
OR
applemacosRange13.013.5
OR
appletvosRange<16.6
OR
applewatchosRange<9.6
VendorProductVersionCPE
appleipados*cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
appleiphone_os*cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
applemacos*cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
appletvos*cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
applewatchos*cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

AI Score

4.7

Confidence

High

EPSS

0.003

Percentile

66.6%