Search for vulnerabilities
Vulnerability details: VCID-7ht9-avxg-aaaf
Vulnerability ID VCID-7ht9-avxg-aaaf
Aliases CVE-2023-23517
Summary The issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.6.3, macOS Ventura 13.2, watchOS 9.3, macOS Big Sur 11.7.3, Safari 16.3, tvOS 16.3, iOS 16.3 and iPadOS 16.3. Processing maliciously crafted web content may lead to arbitrary code execution.
Status Published
Exploitability 0.5
Weighted Severity 7.9
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3 8.8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23517.json
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00582 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.008 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00811 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00811 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00811 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00811 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00838 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00838 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00838 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00838 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00838 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00838 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00838 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00838 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00838 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
epss 0.00838 https://api.first.org/data/v1/epss?cve=CVE-2023-23517
cvssv3.1 8.8 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3 8.8 https://nvd.nist.gov/vuln/detail/CVE-2023-23517
cvssv3.1 8.8 https://nvd.nist.gov/vuln/detail/CVE-2023-23517
cvssv3.1 8.8 https://support.apple.com/en-us/HT213599
ssvc Track https://support.apple.com/en-us/HT213599
cvssv3.1 8.8 https://support.apple.com/en-us/HT213600
cvssv3.1 8.8 https://support.apple.com/en-us/HT213600
ssvc Track https://support.apple.com/en-us/HT213600
ssvc Track https://support.apple.com/en-us/HT213600
cvssv3.1 8.8 https://support.apple.com/en-us/HT213601
cvssv3.1 8.8 https://support.apple.com/en-us/HT213601
ssvc Track https://support.apple.com/en-us/HT213601
ssvc Track https://support.apple.com/en-us/HT213601
cvssv3.1 8.8 https://support.apple.com/en-us/HT213603
cvssv3.1 8.8 https://support.apple.com/en-us/HT213603
ssvc Track https://support.apple.com/en-us/HT213603
ssvc Track https://support.apple.com/en-us/HT213603
cvssv3.1 8.8 https://support.apple.com/en-us/HT213604
ssvc Track https://support.apple.com/en-us/HT213604
cvssv3.1 8.8 https://support.apple.com/en-us/HT213605
ssvc Track https://support.apple.com/en-us/HT213605
cvssv3.1 8.8 https://support.apple.com/en-us/HT213606
cvssv3.1 8.8 https://support.apple.com/en-us/HT213606
ssvc Track https://support.apple.com/en-us/HT213606
ssvc Track https://support.apple.com/en-us/HT213606
cvssv3.1 8.8 https://support.apple.com/en-us/HT213638
ssvc Track https://support.apple.com/en-us/HT213638
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23517.json
https://api.first.org/data/v1/epss?cve=CVE-2023-23517
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://security.gentoo.org/glsa/202305-32
https://support.apple.com/en-us/HT213599
https://support.apple.com/en-us/HT213600
https://support.apple.com/en-us/HT213601
https://support.apple.com/en-us/HT213603
https://support.apple.com/en-us/HT213604
https://support.apple.com/en-us/HT213605
https://support.apple.com/en-us/HT213606
https://support.apple.com/en-us/HT213638
2167717 https://bugzilla.redhat.com/show_bug.cgi?id=2167717
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
CVE-2023-23517 https://nvd.nist.gov/vuln/detail/CVE-2023-23517
RHSA-2023:2256 https://access.redhat.com/errata/RHSA-2023:2256
RHSA-2023:2834 https://access.redhat.com/errata/RHSA-2023:2834
USN-5867-1 https://usn.ubuntu.com/5867-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23517.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2023-23517
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2023-23517
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/HT213599
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/ Found at https://support.apple.com/en-us/HT213599
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/HT213600
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/HT213600
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/ Found at https://support.apple.com/en-us/HT213600

Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/ Found at https://support.apple.com/en-us/HT213600
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/HT213601
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/HT213601
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/ Found at https://support.apple.com/en-us/HT213601

Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/ Found at https://support.apple.com/en-us/HT213601
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/HT213603
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/HT213603
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/ Found at https://support.apple.com/en-us/HT213603

Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/ Found at https://support.apple.com/en-us/HT213603
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/HT213604
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/ Found at https://support.apple.com/en-us/HT213604
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/HT213605
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/ Found at https://support.apple.com/en-us/HT213605
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/HT213606
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/HT213606
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/ Found at https://support.apple.com/en-us/HT213606

Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/ Found at https://support.apple.com/en-us/HT213606
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/HT213638
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/ Found at https://support.apple.com/en-us/HT213638
Exploit Prediction Scoring System (EPSS)
Percentile 0.38438
EPSS Score 0.00164
Published At May 7, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.