5.5 CVE-2023-38606
Enriched by CISA CISA Kev Catalog
This issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.6.8, iOS 15.7.8 and iPadOS 15.7.8, iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Big Sur 11.7.9, macOS Ventura 13.5, watchOS 9.6. An app may be able to modify sensitive kernel state. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.1.
https://nvd.nist.gov/vuln/detail/CVE-2023-38606
Categories
CWE-NVD-noinfo
References
134c704f-9b21-4f2e-91b3-4a467353bcc0
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-20... US Government Resource |
af854a3a-2127-422b-91ae-364da2661108
| https://support.apple.com/en-us/HT213841 Vendor Advisory |
| https://support.apple.com/en-us/HT213842 Vendor Advisory |
| https://support.apple.com/en-us/HT213843 Vendor Advisory |
| https://support.apple.com/en-us/HT213844 Vendor Advisory |
| https://support.apple.com/en-us/HT213845 Vendor Advisory |
| https://support.apple.com/en-us/HT213846 Vendor Advisory |
| https://support.apple.com/en-us/HT213848 Vendor Advisory |
product-security@apple.com
| https://support.apple.com/en-us/HT213841 Vendor Advisory |
| https://support.apple.com/en-us/HT213842 Vendor Advisory |
| https://support.apple.com/en-us/HT213843 Vendor Advisory |
| https://support.apple.com/en-us/HT213844 Vendor Advisory |
| https://support.apple.com/en-us/HT213845 Vendor Advisory |
| https://support.apple.com/en-us/HT213846 Vendor Advisory |
| https://support.apple.com/en-us/HT213848 Vendor Advisory |
AFFECTED (from MITRE)
| Vendor | Product | Versions |
|---|---|---|
| Apple | tvOS |
|
| Apple | iOS and iPadOS |
|
| Apple | macOS |
|
| Apple | iOS and iPadOS |
|
| Apple | macOS |
|
| Apple | macOS |
|
| Apple | watchOS |
|
| © 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation. | ||
CPE
| cpe | start | end |
|---|---|---|
| Configuration 1 | ||
| cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* | < 15.7.8 | |
| cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* | >= 16.0 | < 16.6 |
| cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* | < 15.7.8 | |
| cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* | >= 16.0 | < 16.6 |
| cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* | >= 11.0 | < 11.7.9 |
| cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* | >= 12.0.0 | < 12.6.8 |
| cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* | >= 13.0 | < 13.5 |
| cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* | < 16.6 | |
| cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* | < 9.6 | |
REMEDIATION
EXPLOITS
Exploit-db.com
| id | description | date | |
|---|---|---|---|
| No known exploits | |||
POC Github
| Url |
|---|
| No known exploits |
Other Nist (github, ...)
| Url |
|---|
| No known exploits |
CAPEC
Common Attack Pattern Enumerations and Classifications
| id | description | severity |
|---|---|---|
| No entry | ||
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.
