{"dataType":"CVE_RECORD","cveMetadata":{"cveId":"CVE-2023-42917","assignerOrgId":"286789f9-fbc2-4510-9f9a-43facdede74c","state":"PUBLISHED","assignerShortName":"apple","dateReserved":"2023-09-14T19:05:11.463Z","datePublished":"2023-11-30T22:18:50.340Z","dateUpdated":"2025-10-21T23:05:31.441Z"},"containers":{"cna":{"problemTypes":[{"descriptions":[{"lang":"en","description":"Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited against versions of iOS before iOS 16.7.1."}]}],"affected":[{"vendor":"Apple","product":"Safari","versions":[{"version":"unspecified","status":"affected","lessThan":"17.1","versionType":"custom"}]},{"vendor":"Apple","product":"macOS","versions":[{"version":"unspecified","status":"affected","lessThan":"14.1","versionType":"custom"}]},{"vendor":"Apple","product":"iOS and iPadOS","versions":[{"version":"unspecified","status":"affected","lessThan":"17.1","versionType":"custom"}]}],"descriptions":[{"lang":"en","value":"A memory corruption vulnerability was addressed with improved locking. This issue is fixed in iOS 17.1.2 and iPadOS 17.1.2, macOS Sonoma 14.1.2, Safari 17.1.2. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited against versions of iOS before iOS 16.7.1."}],"references":[{"url":"https://support.apple.com/en-us/HT214033"},{"url":"https://support.apple.com/en-us/HT214032"},{"url":"https://support.apple.com/en-us/HT214031"},{"url":"https://support.apple.com/kb/HT214033"},{"url":"http://www.openwall.com/lists/oss-security/2023/12/05/1"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR/"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH/"},{"url":"https://support.apple.com/kb/HT214034"},{"url":"https://www.debian.org/security/2023/dsa-5575"},{"url":"http://seclists.org/fulldisclosure/2023/Dec/3"},{"url":"http://seclists.org/fulldisclosure/2023/Dec/4"},{"url":"http://seclists.org/fulldisclosure/2023/Dec/5"},{"url":"http://seclists.org/fulldisclosure/2023/Dec/8"},{"url":"http://seclists.org/fulldisclosure/2023/Dec/13"},{"url":"http://seclists.org/fulldisclosure/2023/Dec/12"},{"url":"https://security.gentoo.org/glsa/202401-04"},{"url":"https://support.apple.com/kb/HT214062"},{"url":"http://seclists.org/fulldisclosure/2024/Jan/35"}],"providerMetadata":{"orgId":"286789f9-fbc2-4510-9f9a-43facdede74c","shortName":"apple","dateUpdated":"2024-06-12T09:05:54.874Z"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T19:30:24.968Z"},"title":"CVE Program Container","references":[{"url":"https://support.apple.com/en-us/HT214033","tags":["x_transferred"]},{"url":"https://support.apple.com/en-us/HT214032","tags":["x_transferred"]},{"url":"https://support.apple.com/en-us/HT214031","tags":["x_transferred"]},{"url":"https://support.apple.com/kb/HT214033","tags":["x_transferred"]},{"url":"http://www.openwall.com/lists/oss-security/2023/12/05/1","tags":["x_transferred"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR/","tags":["x_transferred"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH/","tags":["x_transferred"]},{"url":"https://support.apple.com/kb/HT214034","tags":["x_transferred"]},{"url":"https://www.debian.org/security/2023/dsa-5575","tags":["x_transferred"]},{"url":"http://seclists.org/fulldisclosure/2023/Dec/3","tags":["x_transferred"]},{"url":"http://seclists.org/fulldisclosure/2023/Dec/4","tags":["x_transferred"]},{"url":"http://seclists.org/fulldisclosure/2023/Dec/5","tags":["x_transferred"]},{"url":"http://seclists.org/fulldisclosure/2023/Dec/8","tags":["x_transferred"]},{"url":"http://seclists.org/fulldisclosure/2023/Dec/13","tags":["x_transferred"]},{"url":"http://seclists.org/fulldisclosure/2023/Dec/12","tags":["x_transferred"]},{"url":"https://security.gentoo.org/glsa/202401-04","tags":["x_transferred"]},{"url":"https://support.apple.com/kb/HT214062","tags":["x_transferred"]},{"url":"http://seclists.org/fulldisclosure/2024/Jan/35","tags":["x_transferred"]}]},{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":8.8,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"REQUIRED","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"id":"CVE-2023-42917","role":"CISA Coordinator","options":[{"Exploitation":"active"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2023-12-02T05:00:19.060611Z"}}},{"other":{"type":"kev","content":{"dateAdded":"2023-12-04","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-42917"}}}],"references":[{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-42917","tags":["government-resource"]}],"problemTypes":[{"descriptions":[{"lang":"en","type":"CWE","cweId":"CWE-787","description":"CWE-787 Out-of-bounds Write"}]}],"timeline":[{"time":"2023-12-04T00:00:00.000Z","lang":"en","value":"CVE-2023-42917 added to CISA KEV"}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-21T23:05:31.441Z"}}]},"dataVersion":"5.1"}