Skip to content

Commit 1724e2d

Browse files
TWangmoDGovEnterpriseadonm
authored
20231204001-Apple-Releases-Security-Updates-for-Multiple-Products (#425)
* 20231027001-Roundcube Webmail Persistent Cross-Site Scripting (XSS) Vulnerability * 20231031001-VVMware-Tools-Multiple-Vulnerabilities * 20231031001-VMware-Tools-Multiple-Vulnerabilities * 20231106001-Cisco-Security-Advisories-for-Multiple-Products-vulnerability * 20231106001-Cisco-Security-Advisories-for-Multiple-Products-vulnerability * 20231109001-Service-Location-Protocol(SLP)-Denial-of-Service-Vulnerability * 20231114001-SysAid-Server-Path-Traversal-Known-Exploited-vulnerability * Update 20231109001-Service-Location-Protocol(SLP)-Denial-of-Service-Vulnerability.md * Update 20231114001-SysAid-Server-Path-Traversal-Known-Exploited-vulnerability.md * 20231115002-Mware-Security-Update-Cloud-Director-Appliance * 20231115002-Mware-Security-Update-Cloud-Director-Appliance * 20231117001-Oracle-Fusion-Middleware-PHP-Remote-File-Inclusion-Vulnerability * 20231117001-Oracle-Fusion-Middleware-PHP-Remote-File-Inclusion-Vulnerability * 20231117001-Oracle-Fusion-Middleware-PHP-Remote-File-Inclusion-Vulnerability * 20231124001-Mozilla-Security-Updates-for-Firefox-and-Thunderbird * 20231201001-Known-Exploited-Vulnerability-in-Google-Skia-Integer-Overflow * Update 20231201001-Known-Exploited-Vulnerability-in-Google-Skia-Integer-Overflow.md * 20231204001-Apple-Releases-Security-Updates-for-Multiple-Products --------- Co-authored-by: Joshua Hitchen (DGov) <[email protected]> Co-authored-by: Adon Metcalfe <[email protected]>
1 parent e7811f1 commit 1724e2d

File tree

1 file changed

+31
-0
lines changed

1 file changed

+31
-0
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
# Apple Releases Security Updates for Multiple Products - 20231204001
2+
3+
## Overview
4+
5+
Apple has released security updates to address vulnerabilities in WebKit for multiple apple products. A cyber threat actor could exploit one of these vulnerabilities to take control of an affected system.
6+
7+
## What is the vulnerability?
8+
9+
- An out-of-bounds read vulnerability [**CVE-2023-42916**](https://nvd.nist.gov/vuln/detail/CVE-2023-42916) - CVSS v3 Base Score: ***N.A***
10+
- A memory corruption vulnerability [**CVE-2023-42916**](https://nvd.nist.gov/vuln/detail/CVE-2023-42917) - CVSS v3 Base Score: ***N.A***
11+
12+
13+
## What is vulnerable?
14+
15+
The vulnerability affects the following apple products WebKit:
16+
17+
- [Safari 17.1.2](https://support.apple.com/en-gb/HT214033)
18+
- [macOS Sonoma 14.1.2](https://support.apple.com/en-gb/HT214032)
19+
- [iOS 17.1.2 and iPadOS 17.1.2](https://support.apple.com/en-us/HT214031)
20+
21+
## What has been observed?
22+
23+
There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.
24+
25+
## Recommendation
26+
27+
The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of *one month* (refer [Patch Management](../guidelines/patch-management.md)):
28+
29+
- [Apple Security Releases](https://support.apple.com/en-us/HT201222)
30+
31+

0 commit comments

Comments
 (0)