cve/2023/CVE-2023-32424.md
2024-05-25 21:48:12 +02:00

20 lines
1.0 KiB
Markdown

### [CVE-2023-32424](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32424)
![](https://img.shields.io/static/v1?label=Product&message=iOS%20and%20iPadOS&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=watchOS&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%2016.4%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%209.4%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=An%20attacker%20that%20has%20already%20achieved%20kernel%20code%20execution%20may%20be%20able%20to%20bypass%20kernel%20memory%20mitigations&color=brighgreen)
### Description
The issue was addressed with improved memory handling. This issue is fixed in iOS 16.4 and iPadOS 16.4, watchOS 9.4. An attacker that has already achieved kernel code execution may be able to bypass kernel memory mitigations.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds