CVE-2023-42916
Advisory lineage Upstream: 0 Downstream: 11
Analyzed
Published: 30 Nov 2023, 22:18
Last modified:21 Oct 2025, 23:05
Vulnerability Summary
Overall Risk (default)
medium
26/100 CVSS Score
6.5 MEDIUM
v3.1 (cve.org)
EPSS Score
0.05% LOW
0% probability 0.00%
KEV
Listed
CISA
1 listing
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected
Timeline
30 Nov 2023, 22:18
Published
Vulnerability first disclosed
04 Dec 2023, 00:00
Added to CISA KEV
Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability
25 Dec 2023, 00:00
CISA Remediation Due
Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable.
21 Oct 2025, 23:05
Last Modified
Vulnerability information updated
Description
An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 17.1.2 and iPadOS 17.1.2, macOS Sonoma 14.1.2, Safari 17.1.2. Processing web content may disclose sensitive information. Apple is aware of a report that this issue may have been exploited against versions of iOS before iOS 16.7.1.
CVSS Metrics
- v3.1•MEDIUM•Score: 6.5CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
EPSS Trends
Current EPSS score: 0.05%• Percentile: 14%
Techniques & Countermeasures
- CWE-125•Out-of-bounds Read
The product reads data past the end, or before the beginning, of the intended buffer.
Affected Systems
- apple•ios and ipados
≥ unspecified, < 17.1
- apple•ipados
< 15.8.1 | ≥ 16.0, < 16.7.3 | ≥ 17.0, < 17.1.2
- apple•iphone_os
< 15.8.1 | ≥ 16.0, < 16.7.3 | ≥ 17.0, < 17.1.2
- apple•macos
≥ 14.0, < 14.1.2 | ≥ unspecified, < 14.1
- apple•safari
< 17.1.2 | ≥ unspecified, < 17.1
- debian•debian_linux
11.0 | 12.0
- fedoraproject•fedora
38 | 39
- Unknown•WebKitGTK
< 2.42.3
References (19)
- https://support.apple.com/en-us/HT214033
- https://support.apple.com/en-us/HT214032
- https://support.apple.com/en-us/HT214031
- https://support.apple.com/kb/HT214033
- http://www.openwall.com/lists/oss-security/2023/12/05/1
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH/
- https://support.apple.com/kb/HT214034
- https://www.debian.org/security/2023/dsa-5575
- http://seclists.org/fulldisclosure/2023/Dec/3
- http://seclists.org/fulldisclosure/2023/Dec/4
- http://seclists.org/fulldisclosure/2023/Dec/5
- http://seclists.org/fulldisclosure/2023/Dec/8
- http://seclists.org/fulldisclosure/2023/Dec/13
- http://seclists.org/fulldisclosure/2023/Dec/12
- https://security.gentoo.org/glsa/202401-04
- https://support.apple.com/kb/HT214062
- http://seclists.org/fulldisclosure/2024/Jan/35
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-42916