CVE-2023-42917
Apple Safari vulnerability analysis and mitigation

Overview

CVE-2023-42917 is a memory corruption vulnerability in WebKit that was discovered and reported by Clément Lecigne of Google's Threat Analysis Group. The vulnerability was disclosed on November 30, 2023, affecting multiple Apple products including iOS, iPadOS, macOS, and Safari, as well as WebKitGTK-based systems. The issue was fixed in iOS 17.1.2, iPadOS 17.1.2, macOS Sonoma 14.1.2, and Safari 17.1.2 (Apple Support, Apple Support).

Technical details

The vulnerability is classified as a memory corruption issue in WebKit that could be exploited through web content processing. It was addressed by implementing improved locking mechanisms. The vulnerability has been assigned a CVSS v3.1 base score of 8.8 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H, indicating it can be exploited remotely with low attack complexity and requires user interaction (NVD).

Impact

When successfully exploited, this vulnerability could lead to arbitrary code execution when processing web content. The impact is particularly severe as it affects multiple platforms and devices, potentially allowing attackers to execute malicious code through web content processing (WebKit Security Advisory, Apple Support).

Mitigation and workarounds

Apple has released security updates to address this vulnerability across multiple platforms. Users should update to iOS 17.1.2, iPadOS 17.1.2, macOS Sonoma 14.1.2, or Safari 17.1.2 depending on their device. For WebKitGTK users, the vulnerability is fixed in version 2.42.3. Debian and Fedora users should update to the patched versions available through their respective package managers (Apple Support, Debian Security, Fedora Update).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management