CVE-2023-32373 in Apple and Red Hat Products
Published on June 23, 2023
Known Exploited Vulnerability
This Apple Multiple Products WebKit Use-After-Free Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Apple iOS, iPadOS, macOS, tvOS, watchOS, and Safari WebKit contain a use-after-free vulnerability that leads to code execution.
The following remediation steps are recommended / required by June 12, 2023: Apply updates per vendor instructions.
Vulnerability Analysis
CVE-2023-32373 can be exploited with network access, requires user interaction. This vulnerability is considered to have a low attack complexity. It has an exploitability score of 2.8 out of four. The potential impact of an exploit of this vulnerability is considered to be very high.
What is a Dangling pointer Vulnerability?
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
CVE-2023-32373 has been classified to as a Dangling pointer vulnerability or weakness.
Products Associated with CVE-2023-32373
You can be notified by stack.watch whenever vulnerabilities like CVE-2023-32373 are published in these products:
What versions are vulnerable to CVE-2023-32373?
- Apple Watch OS Fixed in Version 9.5
- Apple TV OS Fixed in Version 16.5
- Apple Macos Fixed in Version 13.4
- Apple iPad OS Fixed in Version 15.7.6
- Apple Safari Fixed in Version 16.5
- Apple iOS Version 16.0 Fixed in Version 16.5
- Apple iPad OS Version 16.0 Fixed in Version 16.5
- Apple iOS Version 15.0.0 Fixed in Version 15.7.6
- Red Hat Enterprise Linux (RHEL) Version 7.0
- Red Hat Enterprise Linux (RHEL) Version 6.0
- Red Hat Enterprise Linux (RHEL) Version 8.0
- Red Hat Enterprise Linux (RHEL) Version 9.0