
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-38565 is a path handling vulnerability discovered in Apple's operating systems that was addressed in multiple OS versions including macOS Monterey 12.6.8, iOS 16.6, iPadOS 16.6, macOS Big Sur 11.7.9, macOS Ventura 13.5, and watchOS 9.6. The vulnerability was discovered by Zhipeng Huo (@R3dF09) of Tencent Security Xuanwu Lab and disclosed in July 2023 (Apple Security).
The vulnerability exists in the libxpc component and involves a path handling issue that could allow an application to gain root privileges. Apple addressed this security flaw by implementing improved validation mechanisms. The vulnerability has been assigned a CVSS v3.1 base score of 7.8 (HIGH) with the vector string CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H (NVD).
If exploited, this vulnerability could allow a malicious application to gain root privileges on the affected system, potentially giving the attacker complete control over the device (Apple Security).
Apple has released security updates to address this vulnerability across multiple operating system versions. Users should update to macOS Monterey 12.6.8, iOS 16.6, iPadOS 16.6, macOS Big Sur 11.7.9, macOS Ventura 13.5, or watchOS 9.6 depending on their device (Apple Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."