Description
The issue was addressed with improved handling of protocols. This issue is fixed in tvOS 17, iOS 16.7 and iPadOS 16.7, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. A remote attacker may be able to break out of Web Content sandbox.
Exploits (1)
References (14)
Core 14
Core References
Mailing List, Third Party Advisory
http://seclists.org/fulldisclosure/2023/Oct/10
Vendor Advisory
https://support.apple.com/en-us/HT213927
Vendor Advisory
https://support.apple.com/en-us/HT213936
Vendor Advisory
https://support.apple.com/en-us/HT213937
Vendor Advisory
https://support.apple.com/en-us/HT213938
Vendor Advisory
https://support.apple.com/en-us/HT213940
Mailing List
http://seclists.org/fulldisclosure/2023/Oct/3
Mailing List
http://seclists.org/fulldisclosure/2023/Oct/4
Mailing List
http://seclists.org/fulldisclosure/2023/Oct/8
Vendor Advisory
https://support.apple.com/kb/HT213927
Vendor Advisory
https://support.apple.com/kb/HT213936
Vendor Advisory
https://support.apple.com/kb/HT213937
Vendor Advisory
https://support.apple.com/kb/HT213938
Vendor Advisory
https://support.apple.com/kb/HT213940
Scores
CVSS v3
8.6
EPSS
0.0093
EPSS Percentile
76.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
partial
Details
Status
published
Products (5)
apple/ipados
< 16.7
apple/iphone_os
< 16.7
apple/macos
< 14.0
apple/tvos
< 17.0
apple/watchos
< 10.0
Published
Sep 27, 2023
Tracked Since
Feb 18, 2026