
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-32398 is a use-after-free vulnerability discovered in Apple's kernel that was disclosed and patched in May 2023. The vulnerability affects multiple Apple operating systems including iOS 15.7.6 and iPadOS 15.7.6, macOS Ventura 13.4, tvOS 16.5, watchOS 9.5, macOS Big Sur 11.7.7, and macOS Monterey 12.6.6. The vulnerability was discovered by Adam Doupé of ASU SEFCOM (Apple Support).
The vulnerability is classified as a use-after-free issue in the kernel that was addressed with improved memory management. It has been assigned a CVSS v3.1 base score of 7.8 (HIGH) with the vector string CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. The vulnerability is tracked under CWE-416 (Use After Free) (NVD).
If exploited, this vulnerability could allow an app to execute arbitrary code with kernel privileges. This means a malicious application could potentially gain the highest level of system access, compromising the entire device (Apple Support).
Apple has released security updates to address this vulnerability across multiple operating systems. Users should update to watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.6 and iPadOS 15.7.6, macOS Big Sur 11.7.7, macOS Monterey 12.6.6, iOS 16.5 and iPadOS 16.5 (Apple Support).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."