CVE-2023-41993

The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
cpe:2.3:a:oracle:jdk:1.8.0:update401:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.8.0:update401:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vsphere:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
cpe:2.3:a:netapp:cloud_insights_acquisition_unit:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:cloud_insights_storage_workload_security_agent:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*

Configuration 6 (hide)

cpe:2.3:a:webkitgtk:webkitgtk\+:*:*:*:*:*:*:*:*

History

29 Nov 2024, 14:43

Type Values Removed Values Added
CPE cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vsphere:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
References () https://support.apple.com/en-us/HT213940 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213940 - Vendor Advisory
References () https://webkitgtk.org/security/WSA-2023-0009.html - () https://webkitgtk.org/security/WSA-2023-0009.html - Third Party Advisory
First Time Netapp active Iq Unified Manager

21 Nov 2024, 08:22

Type Values Removed Values Added
References
  • () https://webkitgtk.org/security/WSA-2023-0009.html -
References () https://security.gentoo.org/glsa/202401-33 - Third Party Advisory () https://security.gentoo.org/glsa/202401-33 - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20240426-0004/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20240426-0004/ - Third Party Advisory
References () https://support.apple.com/en-us/HT213940 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213940 - Release Notes, Vendor Advisory

03 Sep 2024, 20:19

Type Values Removed Values Added
CPE cpe:2.3:a:webkitgtk:webkitgtk\+:*:*:*:*:*:*:*:*
First Time Webkitgtk
Webkitgtk webkitgtk\+

14 Aug 2024, 15:28

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 9.8
v2 : unknown
v3 : 8.8

23 May 2024, 17:51

Type Values Removed Values Added
CPE cpe:2.3:o:apple:iphone_os:17.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:17.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:a:netapp:cloud_insights_storage_workload_security_agent:-:*:*:*:*:*:*:*
cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
cpe:2.3:a:oracle:jdk:1.8.0:update401:*:*:*:*:*:*
cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
cpe:2.3:a:oracle:jre:1.8.0:update401:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:cloud_insights_acquisition_unit:-:*:*:*:*:*:*:*
First Time Oracle jdk
Oracle jre
Netapp oncommand Workflow Automation
Netapp cloud Insights Acquisition Unit
Netapp oncommand Insight
Netapp
Netapp cloud Insights Storage Workload Security Agent
Oracle
Oracle graalvm
References () https://security.gentoo.org/glsa/202401-33 - () https://security.gentoo.org/glsa/202401-33 - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20240426-0004/ - () https://security.netapp.com/advisory/ntap-20240426-0004/ - Third Party Advisory

26 Apr 2024, 09:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20240426-0004/ -

31 Jan 2024, 15:15

Type Values Removed Values Added
References
  • () https://security.gentoo.org/glsa/202401-33 -

23 Jan 2024, 01:15

Type Values Removed Values Added
References
  • {'url': 'https://support.apple.com/kb/HT213930', 'name': 'https://support.apple.com/kb/HT213930', 'tags': [], 'refsource': ''}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EEMDC5TQAANFH5D77QM34ZTUKXPFGVL/', 'name': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EEMDC5TQAANFH5D77QM34ZTUKXPFGVL/', 'tags': ['Mailing List'], 'refsource': 'MISC'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ELXBV26Q54BIOVN5LBCJFM2G6VQZ7FO/', 'name': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ELXBV26Q54BIOVN5LBCJFM2G6VQZ7FO/', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MISC'}
  • {'url': 'https://support.apple.com/en-us/HT213941', 'name': 'https://support.apple.com/en-us/HT213941', 'tags': ['Release Notes', 'Vendor Advisory'], 'refsource': 'MISC'}
  • {'url': 'http://seclists.org/fulldisclosure/2023/Oct/2', 'name': 'http://seclists.org/fulldisclosure/2023/Oct/2', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MISC'}
  • {'url': 'http://seclists.org/fulldisclosure/2023/Oct/4', 'name': 'http://seclists.org/fulldisclosure/2023/Oct/4', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MISC'}
  • {'url': 'https://support.apple.com/kb/HT213926', 'name': 'https://support.apple.com/kb/HT213926', 'tags': [], 'refsource': ''}
  • {'url': 'http://seclists.org/fulldisclosure/2023/Oct/3', 'name': 'http://seclists.org/fulldisclosure/2023/Oct/3', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MISC'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EYRHTFVN6FTXLZ27IPTNRSXKBAR2SOMA/', 'name': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EYRHTFVN6FTXLZ27IPTNRSXKBAR2SOMA/', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MISC'}
  • {'url': 'https://www.debian.org/security/2023/dsa-5527', 'name': 'https://www.debian.org/security/2023/dsa-5527', 'tags': ['Third Party Advisory'], 'refsource': 'MISC'}
  • {'url': 'http://www.openwall.com/lists/oss-security/2023/09/28/3', 'name': 'http://www.openwall.com/lists/oss-security/2023/09/28/3', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MISC'}
  • {'url': 'https://support.apple.com/en-us/HT213927', 'name': 'https://support.apple.com/en-us/HT213927', 'tags': ['Release Notes', 'Vendor Advisory'], 'refsource': 'MISC'}
Summary The issue was addressed with improved checks. This issue is fixed in Safari 17, iOS 16.7 and iPadOS 16.7, macOS Sonoma 14. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7. The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7.

21 Dec 2023, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-21 19:15

Updated : 2024-11-29 14:43


NVD link : CVE-2023-41993

Mitre link : CVE-2023-41993

CVE.ORG link : CVE-2023-41993


JSON object : View

Products Affected

apple

  • iphone_os
  • macos
  • ipados

fedoraproject

  • fedora

netapp

  • cloud_insights_storage_workload_security_agent
  • oncommand_insight
  • cloud_insights_acquisition_unit
  • oncommand_workflow_automation
  • active_iq_unified_manager

debian

  • debian_linux

oracle

  • graalvm
  • jdk
  • jre

webkitgtk

  • webkitgtk\+
CWE
CWE-754

Improper Check for Unusual or Exceptional Conditions