CVE-2023-42843
Advisory lineage Upstream: 0 Downstream: 13
Analyzed
Published: 21 Feb 2024, 06:41
Last modified:13 Feb 2025, 17:09
Vulnerability Summary
Overall Risk (default)
medium
30/100 CVSS Score
7.5 HIGH
v3.1 (cve.org)
EPSS Score
0.1% LOW
0% probability +0.01%
KEV
Not listed
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected
Timeline
21 Feb 2024, 06:41
Published
Vulnerability first disclosed
13 Feb 2025, 17:09
Last Modified
Vulnerability information updated
Description
An inconsistent user interface issue was addressed with improved state management. This issue is fixed in iOS 16.7.2 and iPadOS 16.7.2, iOS 17.1 and iPadOS 17.1, Safari 17.1, macOS Sonoma 14.1. Visiting a malicious website may lead to address bar spoofing.
CVSS Metrics
- v3.1•HIGH•Score: 7.5CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
- v3.1•MEDIUM•Score: 4.3CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
EPSS Trends
Current EPSS score: 0.10%• Percentile: 27%
Techniques & Countermeasures
- CWE-290•Authentication Bypass by Spoofing
This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.
Affected Systems
- apple•ios and ipados
≥ unspecified, < 16.7 | ≥ unspecified, < 17.1
- apple•ipad_os
< 16.7.2 | ≥ 17.0, < 17.1
- apple•iphone_os
< 16.7.2 | ≥ 17.0, < 17.1
- apple•macos
≥ unspecified, < 14.1 | 14.0
- apple•safari
≥ unspecified, < 17.1 | < 17.1
- fedoraproject•fedora
40
- Unknown•WebKitGTK
< 2.44.0
- wpewebkit•wpe_webkit
< 2.44.0
References (6)
- https://support.apple.com/en-us/HT213981
- https://support.apple.com/en-us/HT213986
- https://support.apple.com/en-us/HT213984
- https://support.apple.com/en-us/HT213982
- http://www.openwall.com/lists/oss-security/2024/03/26/1
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/