CVE-2023-28205 vulnerability in Apple Products
Published on April 10, 2023
Known Exploited Vulnerability
This Apple Multiple Products WebKit Use-After-Free Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Apple iOS, iPadOS, macOS, and Safari WebKit contain a use-after-free vulnerability that leads to code execution when processing maliciously crafted web content.
The following remediation steps are recommended / required by May 1, 2023: Apply updates per vendor instructions.
Vulnerability Analysis
CVE-2023-28205 can be exploited with network access, requires user interaction. This vulnerability is considered to have a low attack complexity. It has an exploitability score of 2.8 out of four. The potential impact of an exploit of this vulnerability is considered to be very high.
What is a Dangling pointer Vulnerability?
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
CVE-2023-28205 has been classified to as a Dangling pointer vulnerability or weakness.
Products Associated with CVE-2023-28205
You can be notified by stack.watch whenever vulnerabilities like CVE-2023-28205 are published in these products:
What versions are vulnerable to CVE-2023-28205?
- Apple Safari Fixed in Version 16.4.1
- Apple Macos Fixed in Version 13.3.1
- Apple iPad OS Fixed in Version 15.7.5
- Apple iOS Fixed in Version 15.7.5
- Apple iOS Version 16.0 Fixed in Version 16.4.1
- Apple iPad OS Version 16.0 Fixed in Version 16.4.1