CVE-2023-41993

The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
cpe:2.3:a:oracle:jdk:1.8.0:update401:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.8.0:update401:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vsphere:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
cpe:2.3:a:netapp:cloud_insights_acquisition_unit:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:cloud_insights_storage_workload_security_agent:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*

Configuration 6 (hide)

cpe:2.3:a:webkitgtk:webkitgtk\+:*:*:*:*:*:*:*:*

History

29 Nov 2024, 14:43

Type Values Removed Values Added
First Time Netapp active Iq Unified Manager
References () https://support.apple.com/en-us/HT213940 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213940 - Vendor Advisory
References () https://webkitgtk.org/security/WSA-2023-0009.html - () https://webkitgtk.org/security/WSA-2023-0009.html - Third Party Advisory
CPE cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vsphere:*:*

21 Nov 2024, 08:22

Type Values Removed Values Added
References
  • () https://webkitgtk.org/security/WSA-2023-0009.html -
References () https://security.gentoo.org/glsa/202401-33 - Third Party Advisory () https://security.gentoo.org/glsa/202401-33 - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20240426-0004/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20240426-0004/ - Third Party Advisory
References () https://support.apple.com/en-us/HT213940 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213940 - Release Notes, Vendor Advisory

03 Sep 2024, 20:19

Type Values Removed Values Added
CPE cpe:2.3:a:webkitgtk:webkitgtk\+:*:*:*:*:*:*:*:*
First Time Webkitgtk
Webkitgtk webkitgtk\+

14 Aug 2024, 15:28

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 9.8
v2 : unknown
v3 : 8.8

23 May 2024, 17:51

Type Values Removed Values Added
References () https://security.gentoo.org/glsa/202401-33 - () https://security.gentoo.org/glsa/202401-33 - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20240426-0004/ - () https://security.netapp.com/advisory/ntap-20240426-0004/ - Third Party Advisory
CPE cpe:2.3:o:apple:ipados:17.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:17.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:a:netapp:cloud_insights_storage_workload_security_agent:-:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.8.0:update401:*:*:*:*:*:*
cpe:2.3:a:oracle:graalvm:21.3.9:*:*:*:enterprise:*:*:*
cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
cpe:2.3:a:oracle:graalvm:20.3.13:*:*:*:enterprise:*:*:*
cpe:2.3:a:oracle:jdk:1.8.0:update401:*:*:*:*:*:*
cpe:2.3:a:netapp:cloud_insights_acquisition_unit:-:*:*:*:*:*:*:*
First Time Netapp cloud Insights Acquisition Unit
Netapp cloud Insights Storage Workload Security Agent
Oracle jdk
Netapp oncommand Workflow Automation
Oracle graalvm
Netapp
Oracle
Oracle jre
Netapp oncommand Insight

26 Apr 2024, 09:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20240426-0004/ -

31 Jan 2024, 15:15

Type Values Removed Values Added
References
  • () https://security.gentoo.org/glsa/202401-33 -

23 Jan 2024, 01:15

Type Values Removed Values Added
Summary (en) The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14, Safari 17, iOS 16.7 and iPadOS 16.7. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7. (en) The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7.
References
  • {'url': 'https://support.apple.com/en-us/HT213927', 'tags': ['Release Notes', 'Vendor Advisory'], 'source': 'product-security@apple.com'}
  • {'url': 'https://support.apple.com/en-us/HT213941', 'tags': ['Release Notes', 'Vendor Advisory'], 'source': 'product-security@apple.com'}

10 Jan 2024, 22:15

Type Values Removed Values Added
References
  • {'url': 'http://seclists.org/fulldisclosure/2023/Oct/2', 'tags': ['Mailing List', 'Third Party Advisory'], 'source': 'product-security@apple.com'}
  • {'url': 'http://seclists.org/fulldisclosure/2023/Oct/3', 'tags': ['Mailing List', 'Third Party Advisory'], 'source': 'product-security@apple.com'}
  • {'url': 'http://seclists.org/fulldisclosure/2023/Oct/4', 'tags': ['Mailing List', 'Third Party Advisory'], 'source': 'product-security@apple.com'}
  • {'url': 'http://www.openwall.com/lists/oss-security/2023/09/28/3', 'tags': ['Mailing List', 'Third Party Advisory'], 'source': 'product-security@apple.com'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EEMDC5TQAANFH5D77QM34ZTUKXPFGVL/', 'tags': ['Mailing List'], 'source': 'product-security@apple.com'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ELXBV26Q54BIOVN5LBCJFM2G6VQZ7FO/', 'tags': ['Mailing List', 'Third Party Advisory'], 'source': 'product-security@apple.com'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EYRHTFVN6FTXLZ27IPTNRSXKBAR2SOMA/', 'tags': ['Mailing List', 'Third Party Advisory'], 'source': 'product-security@apple.com'}
  • {'url': 'https://support.apple.com/kb/HT213926', 'source': 'product-security@apple.com'}
  • {'url': 'https://support.apple.com/kb/HT213930', 'source': 'product-security@apple.com'}
  • {'url': 'https://www.debian.org/security/2023/dsa-5527', 'tags': ['Third Party Advisory'], 'source': 'product-security@apple.com'}
Summary (en) The issue was addressed with improved checks. This issue is fixed in Safari 17, iOS 16.7 and iPadOS 16.7, macOS Sonoma 14. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7. (en) The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14, Safari 17, iOS 16.7 and iPadOS 16.7. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7.

21 Dec 2023, 22:15

Type Values Removed Values Added
References
  • () https://support.apple.com/kb/HT213930 -

16 Nov 2023, 03:15

Type Values Removed Values Added
References
  • () https://support.apple.com/kb/HT213926 -

Information

Published : 2023-09-21 19:15

Updated : 2024-11-29 14:43


NVD link : CVE-2023-41993

Mitre link : CVE-2023-41993

CVE.ORG link : CVE-2023-41993


JSON object : View

Products Affected

netapp

  • oncommand_insight
  • oncommand_workflow_automation
  • cloud_insights_acquisition_unit
  • active_iq_unified_manager
  • cloud_insights_storage_workload_security_agent

apple

  • ipados
  • macos
  • iphone_os

debian

  • debian_linux

oracle

  • graalvm
  • jre
  • jdk

webkitgtk

  • webkitgtk\+

fedoraproject

  • fedora
CWE
CWE-754

Improper Check for Unusual or Exceptional Conditions