CVE-2023-42843

Analyzed
Published: 21 Feb 2024, 06:41
Last modified:13 Feb 2025, 17:09

Vulnerability Summary

Overall Risk (default)
medium
30/100
CVSS Score
7.5 HIGH
v3.1 (cve.org)
EPSS Score
0.1% LOW
0% probability +0.01%
KEV
Not listed
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected

Timeline

21 Feb 2024, 06:41
Published
Vulnerability first disclosed
13 Feb 2025, 17:09
Last Modified
Vulnerability information updated

Description

An inconsistent user interface issue was addressed with improved state management. This issue is fixed in iOS 16.7.2 and iPadOS 16.7.2, iOS 17.1 and iPadOS 17.1, Safari 17.1, macOS Sonoma 14.1. Visiting a malicious website may lead to address bar spoofing.

CVSS Metrics

  • v3.1HIGHScore: 7.5CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
  • v3.1MEDIUMScore: 4.3CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

EPSS Trends

Current EPSS score: 0.10% Percentile: 27%

Techniques & Countermeasures

  • CWE-290Authentication Bypass by Spoofing

    This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.

Affected Systems

  • appleios and ipados

    ≥ unspecified, < 16.7 | ≥ unspecified, < 17.1

  • appleipad_os

    < 16.7.2 | ≥ 17.0, < 17.1

  • appleiphone_os

    < 16.7.2 | ≥ 17.0, < 17.1

  • applemacos

    ≥ unspecified, < 14.1 | 14.0

  • applesafari

    ≥ unspecified, < 17.1 | < 17.1

  • fedoraprojectfedora

    40

  • UnknownWebKitGTK

    < 2.44.0

  • wpewebkitwpe_webkit

    < 2.44.0

References (6)