Vulnerability Description
The issue was addressed with improved memory handling. This issue is fixed in iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5. An app may be able to execute arbitrary code with kernel privileges.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apple | Ipados | < 16.6 |
| Apple | Iphone Os | < 16.6 |
| Apple | Macos | >= 13.0, < 13.5 |
References
- https://support.apple.com/en-us/HT213841Vendor Advisory
- https://support.apple.com/en-us/HT213843Vendor Advisory
- https://support.apple.com/en-us/HT213841Vendor Advisory
- https://support.apple.com/en-us/HT213843Vendor Advisory
FAQ
What is CVE-2023-38424?
CVE-2023-38424 is a vulnerability with a CVSS score of 7.8 (HIGH). The issue was addressed with improved memory handling. This issue is fixed in iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5. An app may be able to execute arbitrary code with kernel privileges.
How severe is CVE-2023-38424?
CVE-2023-38424 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-38424?
Check the references section above for vendor advisories and patch information. Affected products include: Apple Ipados, Apple Iphone Os, Apple Macos.