Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2023-32373
PUBLISHED
More InfoOfficial Page
Assigner-apple
Assigner Org ID-286789f9-fbc2-4510-9f9a-43facdede74c
View Known Exploited Vulnerability (KEV) details
Published At-23 Jun, 2023 | 00:00
Updated At-21 Oct, 2025 | 23:05
Rejected At-
▼CVE Numbering Authority (CNA)

A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.6 and iPadOS 15.7.6, Safari 16.5, iOS 16.5 and iPadOS 16.5. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.

Affected Products
Vendor
Apple Inc.Apple
Product
macOS
Versions
Affected
  • From unspecified before 13.4 (custom)
Vendor
Apple Inc.Apple
Product
Safari
Versions
Affected
  • From unspecified before 16.5 (custom)
Vendor
Apple Inc.Apple
Product
watchOS
Versions
Affected
  • From unspecified before 9.5 (custom)
Vendor
Apple Inc.Apple
Product
iOS and iPadOS
Versions
Affected
  • From unspecified before 15.7 (custom)
Vendor
Apple Inc.Apple
Product
iOS and iPadOS
Versions
Affected
  • From unspecified before 16.5 (custom)
Vendor
Apple Inc.Apple
Product
tvOS
Versions
Affected
  • From unspecified before 16.5 (custom)
Problem Types
TypeCWE IDDescription
N/AN/AProcessing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
Type: N/A
CWE ID: N/A
Description: Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://support.apple.com/en-us/HT213758
N/A
https://support.apple.com/en-us/HT213762
N/A
https://support.apple.com/en-us/HT213764
N/A
https://support.apple.com/en-us/HT213765
N/A
https://support.apple.com/en-us/HT213757
N/A
https://support.apple.com/en-us/HT213761
N/A
https://security.gentoo.org/glsa/202401-04
N/A
Hyperlink: https://support.apple.com/en-us/HT213758
Resource: N/A
Hyperlink: https://support.apple.com/en-us/HT213762
Resource: N/A
Hyperlink: https://support.apple.com/en-us/HT213764
Resource: N/A
Hyperlink: https://support.apple.com/en-us/HT213765
Resource: N/A
Hyperlink: https://support.apple.com/en-us/HT213757
Resource: N/A
Hyperlink: https://support.apple.com/en-us/HT213761
Resource: N/A
Hyperlink: https://security.gentoo.org/glsa/202401-04
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://support.apple.com/en-us/HT213758
x_transferred
https://support.apple.com/en-us/HT213762
x_transferred
https://support.apple.com/en-us/HT213764
x_transferred
https://support.apple.com/en-us/HT213765
x_transferred
https://support.apple.com/en-us/HT213757
x_transferred
https://support.apple.com/en-us/HT213761
x_transferred
https://security.gentoo.org/glsa/202401-04
x_transferred
Hyperlink: https://support.apple.com/en-us/HT213758
Resource:
x_transferred
Hyperlink: https://support.apple.com/en-us/HT213762
Resource:
x_transferred
Hyperlink: https://support.apple.com/en-us/HT213764
Resource:
x_transferred
Hyperlink: https://support.apple.com/en-us/HT213765
Resource:
x_transferred
Hyperlink: https://support.apple.com/en-us/HT213757
Resource:
x_transferred
Hyperlink: https://support.apple.com/en-us/HT213761
Resource:
x_transferred
Hyperlink: https://security.gentoo.org/glsa/202401-04
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-416CWE-416 Use After Free
Type: CWE
CWE ID: CWE-416
Description: CWE-416 Use After Free
Metrics
VersionBase scoreBase severityVector
3.18.8HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 8.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Metrics Other Info
kev
dateAdded:
2023-05-22
reference:
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-32373
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
CVE-2023-32373 added to CISA KEV2023-05-22 00:00:00
Event: CVE-2023-32373 added to CISA KEV
Date: 2023-05-22 00:00:00
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-32373
government-resource
Hyperlink: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-32373
Resource:
government-resource
Details not found