cve/2023/CVE-2023-41981.md

24 lines
1.4 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-41981](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41981)
![](https://img.shields.io/static/v1?label=Product&message=iOS%20and%20iPadOS&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=macOS&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=tvOS&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=watchOS&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%2010%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%2013.6%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%2017%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=An%20attacker%20that%20has%20already%20achieved%20kernel%20code%20execution%20may%20be%20able%20to%20bypass%20kernel%20memory%20mitigations&color=brighgreen)
### Description
The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.6, tvOS 17, iOS 16.7 and iPadOS 16.7, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. An attacker that has already achieved kernel code execution may be able to bypass kernel memory mitigations.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/c22dev/BES
- https://github.com/fkie-cad/nvd-json-data-feeds