CVE-2023-41993

The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
cpe:2.3:a:oracle:jdk:1.8.0:update401:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.8.0:update401:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vsphere:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
cpe:2.3:a:netapp:cloud_insights_acquisition_unit:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:cloud_insights_storage_workload_security_agent:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*

Configuration 6 (hide)

cpe:2.3:a:webkitgtk:webkitgtk\+:*:*:*:*:*:*:*:*

History

29 Nov 2024, 14:43

Type Values Removed Values Added
First Time Netapp active Iq Unified Manager
References () https://support.apple.com/en-us/HT213940 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213940 - Vendor Advisory
References () https://webkitgtk.org/security/WSA-2023-0009.html - () https://webkitgtk.org/security/WSA-2023-0009.html - Third Party Advisory
CPE cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vsphere:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*

21 Nov 2024, 08:22

Type Values Removed Values Added
References
  • () https://webkitgtk.org/security/WSA-2023-0009.html -
References () https://security.gentoo.org/glsa/202401-33 - Third Party Advisory () https://security.gentoo.org/glsa/202401-33 - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20240426-0004/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20240426-0004/ - Third Party Advisory
References () https://support.apple.com/en-us/HT213940 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213940 - Release Notes, Vendor Advisory

03 Sep 2024, 20:19

Type Values Removed Values Added
CPE cpe:2.3:a:webkitgtk:webkitgtk\+:*:*:*:*:*:*:*:*
First Time Webkitgtk
Webkitgtk webkitgtk\+

14 Aug 2024, 15:28

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 9.8
v2 : unknown
v3 : 8.8

23 May 2024, 17:51

Type Values Removed Values Added
References () https://security.gentoo.org/glsa/202401-33 - () https://security.gentoo.org/glsa/202401-33 - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20240426-0004/ - () https://security.netapp.com/advisory/ntap-20240426-0004/ - Third Party Advisory
First Time Oracle jre
Netapp
Netapp oncommand Workflow Automation
Netapp oncommand Insight
Netapp cloud Insights Acquisition Unit
Oracle graalvm
Oracle jdk
Oracle
Netapp cloud Insights Storage Workload Security Agent
CPE cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:17.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:17.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.8.0:update401:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:cloud_insights_storage_workload_security_agent:-:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.8.0:update401:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:cloud_insights_acquisition_unit:-:*:*:*:*:*:*:*
cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*

26 Apr 2024, 09:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20240426-0004/ -

31 Jan 2024, 15:15

Type Values Removed Values Added
References
  • () https://security.gentoo.org/glsa/202401-33 -

23 Jan 2024, 01:15

Type Values Removed Values Added
References
  • {'url': 'https://support.apple.com/en-us/HT213941', 'name': 'https://support.apple.com/en-us/HT213941', 'tags': ['Release Notes', 'Vendor Advisory'], 'refsource': 'MISC'}
  • {'url': 'https://support.apple.com/en-us/HT213927', 'name': 'https://support.apple.com/en-us/HT213927', 'tags': ['Release Notes', 'Vendor Advisory'], 'refsource': 'MISC'}
Summary The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14, Safari 17, iOS 16.7 and iPadOS 16.7. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7. The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7.

10 Jan 2024, 22:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EYRHTFVN6FTXLZ27IPTNRSXKBAR2SOMA/', 'name': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EYRHTFVN6FTXLZ27IPTNRSXKBAR2SOMA/', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MISC'}
  • {'url': 'http://seclists.org/fulldisclosure/2023/Oct/4', 'name': 'http://seclists.org/fulldisclosure/2023/Oct/4', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MISC'}
  • {'url': 'http://seclists.org/fulldisclosure/2023/Oct/3', 'name': 'http://seclists.org/fulldisclosure/2023/Oct/3', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MISC'}
  • {'url': 'https://www.debian.org/security/2023/dsa-5527', 'name': 'https://www.debian.org/security/2023/dsa-5527', 'tags': ['Third Party Advisory'], 'refsource': 'MISC'}
  • {'url': 'https://support.apple.com/kb/HT213926', 'name': 'https://support.apple.com/kb/HT213926', 'tags': [], 'refsource': ''}
  • {'url': 'https://support.apple.com/kb/HT213930', 'name': 'https://support.apple.com/kb/HT213930', 'tags': [], 'refsource': ''}
  • {'url': 'http://seclists.org/fulldisclosure/2023/Oct/2', 'name': 'http://seclists.org/fulldisclosure/2023/Oct/2', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MISC'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ELXBV26Q54BIOVN5LBCJFM2G6VQZ7FO/', 'name': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ELXBV26Q54BIOVN5LBCJFM2G6VQZ7FO/', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MISC'}
  • {'url': 'http://www.openwall.com/lists/oss-security/2023/09/28/3', 'name': 'http://www.openwall.com/lists/oss-security/2023/09/28/3', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MISC'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EEMDC5TQAANFH5D77QM34ZTUKXPFGVL/', 'name': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EEMDC5TQAANFH5D77QM34ZTUKXPFGVL/', 'tags': ['Mailing List'], 'refsource': 'MISC'}
Summary The issue was addressed with improved checks. This issue is fixed in Safari 17, iOS 16.7 and iPadOS 16.7, macOS Sonoma 14. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7. The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14, Safari 17, iOS 16.7 and iPadOS 16.7. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7.

21 Dec 2023, 22:15

Type Values Removed Values Added
References
  • () https://support.apple.com/kb/HT213930 -

16 Nov 2023, 03:15

Type Values Removed Values Added
References
  • () https://support.apple.com/kb/HT213926 -

23 Oct 2023, 18:17

Type Values Removed Values Added
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:17.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:17.0:*:*:*:*:*:*:*
References (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EEMDC5TQAANFH5D77QM34ZTUKXPFGVL/ - (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EEMDC5TQAANFH5D77QM34ZTUKXPFGVL/ - Mailing List
References (MISC) https://www.debian.org/security/2023/dsa-5527 - (MISC) https://www.debian.org/security/2023/dsa-5527 - Third Party Advisory
First Time Debian
Debian debian Linux

14 Oct 2023, 03:15

Type Values Removed Values Added
References
  • (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EEMDC5TQAANFH5D77QM34ZTUKXPFGVL/ -

13 Oct 2023, 02:15

Type Values Removed Values Added
References
  • (MISC) https://www.debian.org/security/2023/dsa-5527 -

12 Oct 2023, 02:42

Type Values Removed Values Added
First Time Fedoraproject fedora
Apple macos
Apple ipados
Fedoraproject
References (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EYRHTFVN6FTXLZ27IPTNRSXKBAR2SOMA/ - (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EYRHTFVN6FTXLZ27IPTNRSXKBAR2SOMA/ - Mailing List, Third Party Advisory
References (MISC) http://seclists.org/fulldisclosure/2023/Oct/4 - (MISC) http://seclists.org/fulldisclosure/2023/Oct/4 - Mailing List, Third Party Advisory
References (MISC) http://seclists.org/fulldisclosure/2023/Oct/3 - (MISC) http://seclists.org/fulldisclosure/2023/Oct/3 - Mailing List, Third Party Advisory
References (MISC) https://support.apple.com/en-us/HT213941 - (MISC) https://support.apple.com/en-us/HT213941 - Release Notes, Vendor Advisory
References (MISC) http://seclists.org/fulldisclosure/2023/Oct/2 - (MISC) http://seclists.org/fulldisclosure/2023/Oct/2 - Mailing List, Third Party Advisory
References (MISC) https://support.apple.com/en-us/HT213940 - (MISC) https://support.apple.com/en-us/HT213940 - Release Notes, Vendor Advisory
References (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ELXBV26Q54BIOVN5LBCJFM2G6VQZ7FO/ - (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ELXBV26Q54BIOVN5LBCJFM2G6VQZ7FO/ - Mailing List, Third Party Advisory
References (MISC) http://www.openwall.com/lists/oss-security/2023/09/28/3 - (MISC) http://www.openwall.com/lists/oss-security/2023/09/28/3 - Mailing List, Third Party Advisory
References (MISC) https://support.apple.com/en-us/HT213927 - Vendor Advisory (MISC) https://support.apple.com/en-us/HT213927 - Release Notes, Vendor Advisory
CPE cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:17.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipad_os:17.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*

03 Oct 2023, 06:15

Type Values Removed Values Added
References
  • (MISC) http://seclists.org/fulldisclosure/2023/Oct/3 -
  • (MISC) http://seclists.org/fulldisclosure/2023/Oct/4 -
  • (MISC) http://seclists.org/fulldisclosure/2023/Oct/2 -

01 Oct 2023, 06:15

Type Values Removed Values Added
References
  • (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ELXBV26Q54BIOVN5LBCJFM2G6VQZ7FO/ -

30 Sep 2023, 06:15

Type Values Removed Values Added
References
  • (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EYRHTFVN6FTXLZ27IPTNRSXKBAR2SOMA/ -

28 Sep 2023, 15:15

Type Values Removed Values Added
References
  • (MISC) http://www.openwall.com/lists/oss-security/2023/09/28/3 -

27 Sep 2023, 15:19

Type Values Removed Values Added
References
  • {'url': 'https://support.apple.com/en-us/HT213926', 'name': 'https://support.apple.com/en-us/HT213926', 'tags': ['Vendor Advisory'], 'refsource': 'MISC'}
  • {'url': 'http://seclists.org/fulldisclosure/2023/Sep/19', 'name': 'http://seclists.org/fulldisclosure/2023/Sep/19', 'tags': ['Third Party Advisory'], 'refsource': 'MISC'}
  • {'url': 'http://seclists.org/fulldisclosure/2023/Sep/15', 'name': 'http://seclists.org/fulldisclosure/2023/Sep/15', 'tags': ['Third Party Advisory'], 'refsource': 'MISC'}
  • {'url': 'https://support.apple.com/en-us/HT213930', 'name': 'https://support.apple.com/en-us/HT213930', 'tags': ['Vendor Advisory'], 'refsource': 'MISC'}
  • {'url': 'http://seclists.org/fulldisclosure/2023/Sep/13', 'name': 'http://seclists.org/fulldisclosure/2023/Sep/13', 'tags': ['Third Party Advisory'], 'refsource': 'MISC'}
  • {'url': 'http://seclists.org/fulldisclosure/2023/Sep/14', 'name': 'http://seclists.org/fulldisclosure/2023/Sep/14', 'tags': ['Third Party Advisory'], 'refsource': 'MISC'}
  • (MISC) https://support.apple.com/en-us/HT213941 -
  • (MISC) https://support.apple.com/en-us/HT213940 -
Summary The issue was addressed with improved checks. This issue is fixed in iOS 16.7 and iPadOS 16.7, iOS 17.0.1 and iPadOS 17.0.1, Safari 16.6.1. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7. The issue was addressed with improved checks. This issue is fixed in Safari 17, iOS 16.7 and iPadOS 16.7, macOS Sonoma 14. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7.

25 Sep 2023, 16:47

Type Values Removed Values Added
First Time Apple
Apple iphone Os
Apple safari
Apple ipad Os
References (MISC) https://support.apple.com/en-us/HT213926 - (MISC) https://support.apple.com/en-us/HT213926 - Vendor Advisory
References (MISC) http://seclists.org/fulldisclosure/2023/Sep/13 - (MISC) http://seclists.org/fulldisclosure/2023/Sep/13 - Third Party Advisory
References (MISC) https://support.apple.com/en-us/HT213927 - (MISC) https://support.apple.com/en-us/HT213927 - Vendor Advisory
References (MISC) http://seclists.org/fulldisclosure/2023/Sep/15 - (MISC) http://seclists.org/fulldisclosure/2023/Sep/15 - Third Party Advisory
References (MISC) http://seclists.org/fulldisclosure/2023/Sep/19 - (MISC) http://seclists.org/fulldisclosure/2023/Sep/19 - Third Party Advisory
References (MISC) https://support.apple.com/en-us/HT213930 - (MISC) https://support.apple.com/en-us/HT213930 - Vendor Advisory
References (MISC) http://seclists.org/fulldisclosure/2023/Sep/14 - (MISC) http://seclists.org/fulldisclosure/2023/Sep/14 - Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CPE cpe:2.3:o:apple:iphone_os:17.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipad_os:17.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
CWE CWE-754

23 Sep 2023, 03:15

Type Values Removed Values Added
References
  • (MISC) http://seclists.org/fulldisclosure/2023/Sep/19 -
  • (MISC) http://seclists.org/fulldisclosure/2023/Sep/13 -
  • (MISC) http://seclists.org/fulldisclosure/2023/Sep/15 -
  • (MISC) http://seclists.org/fulldisclosure/2023/Sep/14 -

22 Sep 2023, 06:15

Type Values Removed Values Added
Summary The issue was addressed with improved checks. This issue is fixed in Safari 16.6.1, macOS Ventura 13.6, OS 17.0.1 and iPadOS 17.0.1, iOS 16.7 and iPadOS 16.7. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7. The issue was addressed with improved checks. This issue is fixed in iOS 16.7 and iPadOS 16.7, iOS 17.0.1 and iPadOS 17.0.1, Safari 16.6.1. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7.
References
  • {'url': 'https://support.apple.com/en-us/HT213931', 'name': 'https://support.apple.com/en-us/HT213931', 'tags': [], 'refsource': 'MISC'}

21 Sep 2023, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-21 19:15

Updated : 2024-11-29 14:43


NVD link : CVE-2023-41993

Mitre link : CVE-2023-41993

CVE.ORG link : CVE-2023-41993


JSON object : View

Products Affected

debian

  • debian_linux

netapp

  • cloud_insights_storage_workload_security_agent
  • cloud_insights_acquisition_unit
  • active_iq_unified_manager
  • oncommand_workflow_automation
  • oncommand_insight

fedoraproject

  • fedora

apple

  • iphone_os
  • ipados
  • macos

oracle

  • jre
  • jdk
  • graalvm

webkitgtk

  • webkitgtk\+
CWE
CWE-754

Improper Check for Unusual or Exceptional Conditions