mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
155 lines
6.1 KiB
JSON
155 lines
6.1 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2024-23218",
|
|
"ASSIGNER": "product-security@apple.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "A timing side-channel issue was addressed with improvements to constant-time computation in cryptographic functions. This issue is fixed in macOS Sonoma 14.3, watchOS 10.3, tvOS 17.3, iOS 17.3 and iPadOS 17.3. An attacker may be able to decrypt legacy RSA PKCS#1 v1.5 ciphertexts without having the private key."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "An attacker may be able to decrypt legacy RSA PKCS#1 v1.5 ciphertexts without having the private key"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Apple",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "iOS and iPadOS",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "unspecified",
|
|
"version_value": "17.3"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "tvOS",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "unspecified",
|
|
"version_value": "17.3"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "watchOS",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "unspecified",
|
|
"version_value": "10.3"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "macOS",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "unspecified",
|
|
"version_value": "14.3"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://support.apple.com/en-us/HT214059",
|
|
"refsource": "MISC",
|
|
"name": "https://support.apple.com/en-us/HT214059"
|
|
},
|
|
{
|
|
"url": "https://support.apple.com/en-us/HT214055",
|
|
"refsource": "MISC",
|
|
"name": "https://support.apple.com/en-us/HT214055"
|
|
},
|
|
{
|
|
"url": "https://support.apple.com/en-us/HT214060",
|
|
"refsource": "MISC",
|
|
"name": "https://support.apple.com/en-us/HT214060"
|
|
},
|
|
{
|
|
"url": "https://support.apple.com/en-us/HT214061",
|
|
"refsource": "MISC",
|
|
"name": "https://support.apple.com/en-us/HT214061"
|
|
},
|
|
{
|
|
"url": "http://seclists.org/fulldisclosure/2024/Jan/33",
|
|
"refsource": "MISC",
|
|
"name": "http://seclists.org/fulldisclosure/2024/Jan/33"
|
|
},
|
|
{
|
|
"url": "http://seclists.org/fulldisclosure/2024/Jan/36",
|
|
"refsource": "MISC",
|
|
"name": "http://seclists.org/fulldisclosure/2024/Jan/36"
|
|
},
|
|
{
|
|
"url": "http://seclists.org/fulldisclosure/2024/Jan/39",
|
|
"refsource": "MISC",
|
|
"name": "http://seclists.org/fulldisclosure/2024/Jan/39"
|
|
},
|
|
{
|
|
"url": "http://seclists.org/fulldisclosure/2024/Jan/40",
|
|
"refsource": "MISC",
|
|
"name": "http://seclists.org/fulldisclosure/2024/Jan/40"
|
|
},
|
|
{
|
|
"url": "https://support.apple.com/kb/HT214082",
|
|
"refsource": "MISC",
|
|
"name": "https://support.apple.com/kb/HT214082"
|
|
},
|
|
{
|
|
"url": "https://support.apple.com/kb/HT214083",
|
|
"refsource": "MISC",
|
|
"name": "https://support.apple.com/kb/HT214083"
|
|
},
|
|
{
|
|
"url": "https://support.apple.com/kb/HT214085",
|
|
"refsource": "MISC",
|
|
"name": "https://support.apple.com/kb/HT214085"
|
|
},
|
|
{
|
|
"url": "http://seclists.org/fulldisclosure/2024/Mar/22",
|
|
"refsource": "MISC",
|
|
"name": "http://seclists.org/fulldisclosure/2024/Mar/22"
|
|
}
|
|
]
|
|
}
|
|
} |