Search for vulnerabilities
Vulnerability details: VCID-c9za-72sz-aaab
Vulnerability ID VCID-c9za-72sz-aaab
Aliases CVE-2023-42833
Summary A correctness issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14, Safari 17, iOS 17 and iPadOS 17. Processing web content may lead to arbitrary code execution.
Status Published
Exploitability 0.5
Weighted Severity 7.9
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
System Score Found at
cvssv3 8.8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42833.json
epss 0.00088 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00113 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00113 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00113 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00113 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00113 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00113 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00113 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00256 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00329 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00329 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00329 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00329 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00329 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00329 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00329 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00329 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00329 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00329 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00329 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00329 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00329 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00329 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00329 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00329 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00329 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00338 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00338 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00338 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00447 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00447 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00447 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00447 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00447 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00447 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00447 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00447 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00447 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00447 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00447 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00447 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00447 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00447 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00447 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00447 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00447 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00447 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00447 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00447 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00447 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00447 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00447 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00447 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00447 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00606 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00606 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00606 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00606 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00606 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00606 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00606 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00606 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00606 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00606 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00606 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00606 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00606 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.00606 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.02519 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.02519 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.02519 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.02519 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.02519 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.02519 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.02519 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.02519 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.02519 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.02519 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.02519 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.02519 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.02519 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
epss 0.0602 https://api.first.org/data/v1/epss?cve=CVE-2023-42833
cvssv3.1 8.8 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3 8.8 https://nvd.nist.gov/vuln/detail/CVE-2023-42833
cvssv3.1 8.8 https://nvd.nist.gov/vuln/detail/CVE-2023-42833
cvssv3.1 8.8 https://support.apple.com/en-us/HT213938
ssvc Track https://support.apple.com/en-us/HT213938
cvssv3.1 8.8 https://support.apple.com/en-us/HT213940
ssvc Track https://support.apple.com/en-us/HT213940
cvssv3.1 8.8 https://support.apple.com/en-us/HT213941
ssvc Track https://support.apple.com/en-us/HT213941
cvssv3.1 8.8 http://www.openwall.com/lists/oss-security/2024/02/05/8
ssvc Track http://www.openwall.com/lists/oss-security/2024/02/05/8
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42833.json
https://api.first.org/data/v1/epss?cve=CVE-2023-42833
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://support.apple.com/en-us/HT213938
https://support.apple.com/en-us/HT213940
https://support.apple.com/en-us/HT213941
http://www.openwall.com/lists/oss-security/2024/02/05/8
2270146 https://bugzilla.redhat.com/show_bug.cgi?id=2270146
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
CVE-2023-42833 https://nvd.nist.gov/vuln/detail/CVE-2023-42833
GLSA-202407-13 https://security.gentoo.org/glsa/202407-13
RHSA-2023:6535 https://access.redhat.com/errata/RHSA-2023:6535
RHSA-2023:7055 https://access.redhat.com/errata/RHSA-2023:7055
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42833.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2023-42833
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2023-42833
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/HT213938
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-06T19:20:09Z/ Found at https://support.apple.com/en-us/HT213938
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/HT213940
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-06T19:20:09Z/ Found at https://support.apple.com/en-us/HT213940
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/HT213941
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-06T19:20:09Z/ Found at https://support.apple.com/en-us/HT213941
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at http://www.openwall.com/lists/oss-security/2024/02/05/8
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-06T19:20:09Z/ Found at http://www.openwall.com/lists/oss-security/2024/02/05/8
Exploit Prediction Scoring System (EPSS)
Percentile 0.38624
EPSS Score 0.00088
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
2024-01-11T11:28:58.926454+00:00 NVD Importer Import https://nvd.nist.gov/vuln/detail/CVE-2023-42833 34.0.0rc2