Vulnerability Description
A race condition was addressed with additional validation. This issue is fixed in watchOS 9.3, tvOS 16.3, macOS Ventura 13.2, iOS 16.3 and iPadOS 16.3. A user may be able to read arbitrary files as root.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apple | Ipados | < 16.3 |
| Apple | Iphone Os | < 16.3 |
| Apple | Macos | < 13.2 |
Related Weaknesses (CWE)
References
- https://support.apple.com/en-us/HT213599
- https://support.apple.com/en-us/HT213601
- https://support.apple.com/en-us/HT213605Vendor Advisory
- https://support.apple.com/en-us/HT213606Vendor Advisory
- https://support.apple.com/en-us/HT213599
- https://support.apple.com/en-us/HT213601
- https://support.apple.com/en-us/HT213605Vendor Advisory
- https://support.apple.com/en-us/HT213606Vendor Advisory
FAQ
What is CVE-2023-23520?
CVE-2023-23520 is a vulnerability with a CVSS score of 5.9 (MEDIUM). A race condition was addressed with additional validation. This issue is fixed in watchOS 9.3, tvOS 16.3, macOS Ventura 13.2, iOS 16.3 and iPadOS 16.3. A user may be able to read arbitrary files as ro...
How severe is CVE-2023-23520?
CVE-2023-23520 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-23520?
Check the references section above for vendor advisories and patch information. Affected products include: Apple Ipados, Apple Iphone Os, Apple Macos.