{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2023-28205","assignerOrgId":"286789f9-fbc2-4510-9f9a-43facdede74c","assignerShortName":"apple","dateUpdated":"2025-10-21T23:15:20.482Z","dateReserved":"2023-03-13T00:00:00.000Z","datePublished":"2023-04-10T00:00:00.000Z"},"containers":{"cna":{"problemTypes":[{"descriptions":[{"lang":"en","description":"Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited."}]}],"affected":[{"vendor":"Apple","product":"iOS and iPadOS","versions":[{"version":"unspecified","status":"affected","lessThan":"15.7","versionType":"custom"}]},{"vendor":"Apple","product":"Safari","versions":[{"version":"unspecified","status":"affected","lessThan":"16.4","versionType":"custom"}]},{"vendor":"Apple","product":"macOS","versions":[{"version":"unspecified","status":"affected","lessThan":"13.3","versionType":"custom"}]},{"vendor":"Apple","product":"iOS and iPadOS","versions":[{"version":"unspecified","status":"affected","lessThan":"16.4","versionType":"custom"}]}],"descriptions":[{"lang":"en","value":"A use after free issue was addressed with improved memory management. This issue is fixed in Safari 16.4.1, iOS 15.7.5 and iPadOS 15.7.5, iOS 16.4.1 and iPadOS 16.4.1, macOS Ventura 13.3.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited."}],"references":[{"url":"https://support.apple.com/en-us/HT213723"},{"url":"https://support.apple.com/en-us/HT213722"},{"url":"https://support.apple.com/en-us/HT213721"},{"url":"https://support.apple.com/en-us/HT213720"}],"providerMetadata":{"orgId":"286789f9-fbc2-4510-9f9a-43facdede74c","shortName":"apple","dateUpdated":"2023-07-27T03:46:09.018Z"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T12:30:24.829Z"},"title":"CVE Program Container","references":[{"url":"https://support.apple.com/en-us/HT213723","tags":["x_transferred"]},{"url":"https://support.apple.com/en-us/HT213722","tags":["x_transferred"]},{"url":"https://support.apple.com/en-us/HT213721","tags":["x_transferred"]},{"url":"https://support.apple.com/en-us/HT213720","tags":["x_transferred"]}]},{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":8.8,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"REQUIRED","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"id":"CVE-2023-28205","role":"CISA Coordinator","options":[{"Exploitation":"active"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2025-01-28T21:10:57.791125Z"}}},{"other":{"type":"kev","content":{"dateAdded":"2023-04-10","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-28205"}}}],"references":[{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-28205","tags":["government-resource"]}],"problemTypes":[{"descriptions":[{"lang":"en","type":"CWE","cweId":"CWE-416","description":"CWE-416 Use After Free"}]}],"timeline":[{"time":"2023-04-10T00:00:00.000Z","lang":"en","value":"CVE-2023-28205 added to CISA KEV"}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-21T23:15:20.482Z"}}]}}