CVE-2023-42875
Advisory lineage Upstream: 0 Downstream: 16
Analyzed
Published: 11 Apr 2025, 14:53
Last modified:26 Feb 2026, 18:28
Vulnerability Summary
Overall Risk (default)
medium
29/100 CVSS Score
7.3 HIGH
v3.1 (cve.org)
EPSS Score
0.29% LOW
0% probability +0.19%
KEV
Not listed
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected
Timeline
11 Apr 2025, 14:53
Published
Vulnerability first disclosed
26 Feb 2026, 18:28
Last Modified
Vulnerability information updated
Description
Processing web content may lead to arbitrary code execution. This issue is fixed in iOS 17 and iPadOS 17, macOS Sonoma 14, watchOS 10, tvOS 17, Safari 17. The issue was addressed with improved memory handling.
CVSS Metrics
- v3.1•HIGH•Score: 7.3CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
EPSS Trends
Current EPSS score: 0.29%• Percentile: 52%
Techniques & Countermeasures
- CWE-94•Improper Control of Generation of Code ('Code Injection')
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Affected Systems
- apple•ios and ipados
≥ unspecified, < 17
- apple•ipados
< 17.0
- apple•iphone_os
< 17.0
- apple•macos
< 14.0 | ≥ unspecified, < 14
- apple•safari
< 17.0 | ≥ unspecified, < 17
- apple•tvos
< 17.0 | ≥ unspecified, < 17
- apple•watchos
< 10.0 | ≥ unspecified, < 10