Vulnerability Description
The issue was addressed with additional permissions checks. This issue is fixed in macOS Ventura 13.6.1. An attacker may be able to access passkeys without authentication.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apple | Macos | >= 13.0, < 13.6.1 |
Related Weaknesses (CWE)
References
- http://seclists.org/fulldisclosure/2023/Oct/26Mailing ListThird Party Advisory
- https://support.apple.com/en-us/HT213985Release NotesVendor Advisory
- https://support.apple.com/kb/HT213927
- https://support.apple.com/kb/HT213938
- https://support.apple.com/kb/HT213940
- https://support.apple.com/kb/HT213985Release NotesVendor Advisory
- http://seclists.org/fulldisclosure/2023/Oct/26Mailing ListThird Party Advisory
- https://support.apple.com/en-us/HT213985Release NotesVendor Advisory
- https://support.apple.com/kb/HT213927
- https://support.apple.com/kb/HT213938
- https://support.apple.com/kb/HT213940
- https://support.apple.com/kb/HT213985Release NotesVendor Advisory
FAQ
What is CVE-2023-40401?
CVE-2023-40401 is a vulnerability with a CVSS score of 7.5 (HIGH). The issue was addressed with additional permissions checks. This issue is fixed in macOS Ventura 13.6.1. An attacker may be able to access passkeys without authentication.
How severe is CVE-2023-40401?
CVE-2023-40401 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-40401?
Check the references section above for vendor advisories and patch information. Affected products include: Apple Macos.