cve/2023/CVE-2023-40424.md

22 lines
1.1 KiB
Markdown
Raw Normal View History

2024-06-08 09:32:58 +00:00
### [CVE-2023-40424](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40424)
![](https://img.shields.io/static/v1?label=Product&message=iOS%20and%20iPadOS&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=macOS&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=watchOS&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%2010%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%2014%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%2017%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data&color=brighgreen)
### Description
The issue was addressed with improved checks. This issue is fixed in iOS 17 and iPadOS 17, watchOS 10, macOS Sonoma 14. An app may be able to access user-sensitive data.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/zgimszhd61/openai-sec-test-cve-quickstart