
Cloud Vulnerability DB
A community-led vulnerabilities database
A use-after-free vulnerability (CVE-2023-32381) was discovered affecting multiple Apple operating systems including macOS Monterey 12.6.8, iOS 16.6, iPadOS 16.6, tvOS 16.6, macOS Big Sur 11.7.9, macOS Ventura 13.5, and watchOS 9.6. The vulnerability was reported by an anonymous researcher and fixed by Apple in July 2023 (Apple Support).
The vulnerability is a use-after-free issue in the kernel component that was addressed with improved memory management. It has been assigned a CVSS v3.1 base score of 7.8 (HIGH) with the vector string CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H, indicating local access required with low attack complexity and no privileges required (NVD).
If exploited, this vulnerability could allow an app to execute arbitrary code with kernel privileges, potentially giving an attacker complete control over the affected device (Apple Support).
Apple has addressed this vulnerability by implementing improved memory management in the affected operating systems. Users should update to iOS 16.6, iPadOS 16.6, macOS Monterey 12.6.8, macOS Big Sur 11.7.9, macOS Ventura 13.5, tvOS 16.6, or watchOS 9.6 as appropriate for their devices (Apple Support).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."