Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2023-41992
PUBLISHED
More InfoOfficial Page
Assigner-apple
Assigner Org ID-286789f9-fbc2-4510-9f9a-43facdede74c
View Known Exploited Vulnerability (KEV) details
Published At-21 Sep, 2023 | 18:23
Updated At-04 Nov, 2025 | 19:21
Rejected At-
▼CVE Numbering Authority (CNA)

The issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.7, iOS 16.7 and iPadOS 16.7, macOS Ventura 13.6. A local attacker may be able to elevate their privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7.

Affected Products
Vendor
Apple Inc.Apple
Product
macOS
Versions
Affected
  • From unspecified before 12.7 (custom)
Vendor
Apple Inc.Apple
Product
iOS and iPadOS
Versions
Affected
  • From unspecified before 16.7 (custom)
Vendor
Apple Inc.Apple
Product
macOS
Versions
Affected
  • From unspecified before 13.6 (custom)
Problem Types
TypeCWE IDDescription
N/AN/AA local attacker may be able to elevate their privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7.
Type: N/A
CWE ID: N/A
Description: A local attacker may be able to elevate their privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7.
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://support.apple.com/en-us/HT213932
N/A
https://support.apple.com/en-us/HT213927
N/A
https://support.apple.com/en-us/HT213931
N/A
Hyperlink: https://support.apple.com/en-us/HT213932
Resource: N/A
Hyperlink: https://support.apple.com/en-us/HT213927
Resource: N/A
Hyperlink: https://support.apple.com/en-us/HT213931
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://support.apple.com/en-us/HT213932
x_transferred
https://support.apple.com/en-us/HT213927
x_transferred
https://support.apple.com/en-us/HT213931
x_transferred
https://support.apple.com/kb/HT213932
N/A
https://support.apple.com/kb/HT213927
N/A
Hyperlink: https://support.apple.com/en-us/HT213932
Resource:
x_transferred
Hyperlink: https://support.apple.com/en-us/HT213927
Resource:
x_transferred
Hyperlink: https://support.apple.com/en-us/HT213931
Resource:
x_transferred
Hyperlink: https://support.apple.com/kb/HT213932
Resource: N/A
Hyperlink: https://support.apple.com/kb/HT213927
Resource: N/A
2. CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-754CWE-754 Improper Check for Unusual or Exceptional Conditions
Type: CWE
CWE ID: CWE-754
Description: CWE-754 Improper Check for Unusual or Exceptional Conditions
Metrics
VersionBase scoreBase severityVector
3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
kev
dateAdded:
2023-09-25
reference:
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-41992
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
CVE-2023-41992 added to CISA KEV2023-09-25 00:00:00
Event: CVE-2023-41992 added to CISA KEV
Date: 2023-09-25 00:00:00
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-41992
government-resource
Hyperlink: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-41992
Resource:
government-resource
Details not found