cve/2023/CVE-2023-38596.md

23 lines
1.2 KiB
Markdown
Raw Permalink Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-38596](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38596)
![](https://img.shields.io/static/v1?label=Product&message=iOS%20and%20iPadOS&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=macOS&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=tvOS&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=watchOS&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%2010%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%2014%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%2017%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=An%20app%20may%20fail%20to%20enforce%20App%20Transport%20Security&color=brighgreen)
### Description
The issue was addressed with improved handling of protocols. This issue is fixed in tvOS 17, iOS 17 and iPadOS 17, watchOS 10, macOS Sonoma 14. An app may fail to enforce App Transport Security.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/trailofbits/publications