CVE-2023-42875

Advisory lineage Upstream: 0 Downstream: 16
Analyzed
Published: 11 Apr 2025, 14:53
Last modified:26 Feb 2026, 18:28

Vulnerability Summary

Overall Risk (default)
medium
29/100
CVSS Score
7.3 HIGH
v3.1 (cve.org)
EPSS Score
0.29% LOW
0% probability +0.19%
KEV
Not listed
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected

Timeline

11 Apr 2025, 14:53
Published
Vulnerability first disclosed
26 Feb 2026, 18:28
Last Modified
Vulnerability information updated

Description

Processing web content may lead to arbitrary code execution. This issue is fixed in iOS 17 and iPadOS 17, macOS Sonoma 14, watchOS 10, tvOS 17, Safari 17. The issue was addressed with improved memory handling.

CVSS Metrics

  • v3.1HIGHScore: 7.3CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N

EPSS Trends

Current EPSS score: 0.29% Percentile: 52%

Techniques & Countermeasures

  • CWE-94Improper Control of Generation of Code ('Code Injection')

    The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.

Affected Systems

  • appleios and ipados

    ≥ unspecified, < 17

  • appleipados

    < 17.0

  • appleiphone_os

    < 17.0

  • applemacos

    < 14.0 | ≥ unspecified, < 14

  • applesafari

    < 17.0 | ≥ unspecified, < 17

  • appletvos

    < 17.0 | ≥ unspecified, < 17

  • applewatchos

    < 10.0 | ≥ unspecified, < 10

References (5)