Search for vulnerabilities
Vulnerability details: VCID-w4my-3825-aaar
Vulnerability ID VCID-w4my-3825-aaar
Aliases CVE-2023-23518
Summary The issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.6.3, macOS Ventura 13.2, watchOS 9.3, macOS Big Sur 11.7.3, Safari 16.3, tvOS 16.3, iOS 16.3 and iPadOS 16.3. Processing maliciously crafted web content may lead to arbitrary code execution.
Status Published
Exploitability 0.5
Weighted Severity 7.9
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3 8.8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23518.json
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00164 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00261 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00582 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.008 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00811 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00811 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00811 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00811 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00838 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00838 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00838 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00838 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00838 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00838 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00838 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00838 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00838 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
epss 0.00838 https://api.first.org/data/v1/epss?cve=CVE-2023-23518
cvssv3.1 8.8 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3 8.8 https://nvd.nist.gov/vuln/detail/CVE-2023-23518
cvssv3.1 8.8 https://nvd.nist.gov/vuln/detail/CVE-2023-23518
cvssv3.1 8.8 https://support.apple.com/en-us/HT213599
ssvc Track https://support.apple.com/en-us/HT213599
ssvc Track https://support.apple.com/en-us/HT213600
ssvc Track https://support.apple.com/en-us/HT213600
ssvc Track https://support.apple.com/en-us/HT213601
ssvc Track https://support.apple.com/en-us/HT213601
ssvc Track https://support.apple.com/en-us/HT213603
ssvc Track https://support.apple.com/en-us/HT213603
cvssv3.1 8.8 https://support.apple.com/en-us/HT213604
ssvc Track https://support.apple.com/en-us/HT213604
cvssv3.1 8.8 https://support.apple.com/en-us/HT213605
ssvc Track https://support.apple.com/en-us/HT213605
ssvc Track https://support.apple.com/en-us/HT213606
ssvc Track https://support.apple.com/en-us/HT213606
cvssv3.1 8.8 https://support.apple.com/en-us/HT213638
ssvc Track https://support.apple.com/en-us/HT213638
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23518.json
https://api.first.org/data/v1/epss?cve=CVE-2023-23518
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://security.gentoo.org/glsa/202305-32
https://support.apple.com/en-us/HT213599
https://support.apple.com/en-us/HT213600
https://support.apple.com/en-us/HT213601
https://support.apple.com/en-us/HT213603
https://support.apple.com/en-us/HT213604
https://support.apple.com/en-us/HT213605
https://support.apple.com/en-us/HT213606
https://support.apple.com/en-us/HT213638
2167715 https://bugzilla.redhat.com/show_bug.cgi?id=2167715
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
CVE-2023-23518 https://nvd.nist.gov/vuln/detail/CVE-2023-23518
RHSA-2023:2256 https://access.redhat.com/errata/RHSA-2023:2256
RHSA-2023:2834 https://access.redhat.com/errata/RHSA-2023:2834
USN-5867-1 https://usn.ubuntu.com/5867-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23518.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2023-23518
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2023-23518
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/HT213599
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/ Found at https://support.apple.com/en-us/HT213599

Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/ Found at https://support.apple.com/en-us/HT213600

Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/ Found at https://support.apple.com/en-us/HT213600

Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/ Found at https://support.apple.com/en-us/HT213601

Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/ Found at https://support.apple.com/en-us/HT213601

Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/ Found at https://support.apple.com/en-us/HT213603

Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/ Found at https://support.apple.com/en-us/HT213603
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/HT213604
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/ Found at https://support.apple.com/en-us/HT213604
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/HT213605
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/ Found at https://support.apple.com/en-us/HT213605

Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/ Found at https://support.apple.com/en-us/HT213606

Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/ Found at https://support.apple.com/en-us/HT213606
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/HT213638
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/ Found at https://support.apple.com/en-us/HT213638
Exploit Prediction Scoring System (EPSS)
Percentile 0.38438
EPSS Score 0.00164
Published At May 7, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.