CVE-2023-28205
Apple Multiple Products WebKit Use-After-Free Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
YesDecision
Descriptions
A use after free issue was addressed with improved memory management. This issue is fixed in Safari 16.4.1, iOS 15.7.5 and iPadOS 15.7.5, iOS 16.4.1 and iPadOS 16.4.1, macOS Ventura 13.3.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
A flaw was found in the webkitgtk package. An improper input validation issue may lead to a use-after-free vulnerability. This vulnerability allows attackers with network access to pass specially crafted web content files, causing Denial of Service or Arbitrary Code Execution.
Vulnerabilities have been discovered in the WebKitGTK web engine. Luan Herrera discovered that an HTML document may be able to render iframes with sensitive user information. P1umer and Q1IQ discovered that processing maliciously crafted web content may lead to arbitrary code execution. An anonymous researcher discovered that processing maliciously crafted web content may bypass Same Origin Policy. An anonymous researcher discovered that a website may be able to track sensitive user information. Clement Lecigne and Donncha O Cearbhaill discovered that processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
Apple iOS, iPadOS, macOS, and Safari WebKit contain a use-after-free vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.
CVSS Scores
SSVC
- Decision:Act
Timeline
- 2023-03-13 CVE Reserved
- 2023-04-10 CVE Published
- 2023-04-10 Exploited in Wild
- 2023-05-01 KEV Due Date
- 2024-12-04 First Exploit
- 2025-01-28 CVE Updated
- 2025-03-30 EPSS Updated
CWE
- CWE-416: Use After Free
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
https://support.apple.com/en-us/HT213720 | Release Notes |
|
https://support.apple.com/en-us/HT213721 | Release Notes |
|
https://support.apple.com/en-us/HT213722 | Release Notes |
|
https://support.apple.com/en-us/HT213723 | Release Notes |
|
URL | Date | SRC |
---|---|---|
https://github.com/ntfargo/uaf-2023-28205 | 2024-12-04 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/security/cve/CVE-2023-28205 | 2023-04-20 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2185724 | 2023-04-20 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Apple Search vendor "Apple" | Safari Search vendor "Apple" for product "Safari" | < 16.4.1 Search vendor "Apple" for product "Safari" and version " < 16.4.1" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Ipados Search vendor "Apple" for product "Ipados" | < 15.7.5 Search vendor "Apple" for product "Ipados" and version " < 15.7.5" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Ipados Search vendor "Apple" for product "Ipados" | >= 16.0 < 16.4.1 Search vendor "Apple" for product "Ipados" and version " >= 16.0 < 16.4.1" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Iphone Os Search vendor "Apple" for product "Iphone Os" | < 15.7.5 Search vendor "Apple" for product "Iphone Os" and version " < 15.7.5" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Iphone Os Search vendor "Apple" for product "Iphone Os" | >= 16.0 < 16.4.1 Search vendor "Apple" for product "Iphone Os" and version " >= 16.0 < 16.4.1" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Macos Search vendor "Apple" for product "Macos" | < 13.3.1 Search vendor "Apple" for product "Macos" and version " < 13.3.1" | - |
Affected
|