Apple Multiple Products WebKit Use-After-Free Vulnerability

Summary

CVECVE-2023-28205
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2023-04-10 19:15:00 UTC
Updated2023-07-27 04:15:00 UTC
DescriptionA use after free issue was addressed with improved memory management. This issue is fixed in Safari 16.4.1, iOS 15.7.5 and iPadOS 15.7.5, iOS 16.4.1 and iPadOS 16.4.1, macOS Ventura 13.3.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.

Risk And Classification

EPSS: 0.001120000 probability, percentile 0.297590000 (date 2026-04-01)

CISA KEV: Listed on 2023-04-10; due 2023-05-01; ransomware use Unknown

Problem Types: CWE-416

CISA Known Exploited Vulnerability

VendorApple
ProductMultiple Products
NameApple Multiple Products WebKit Use-After-Free Vulnerability
Required ActionApply updates per vendor instructions.
Noteshttps://support.apple.com/en-us/HT213720,https://support.apple.com/en-us/HT213721,https://support.apple.com/en-us/HT213722,https://support.apple.com/en-us/HT213723; https://nvd.nist.gov/vuln/detail/CVE-2023-28205

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Operating System Apple Ipados All All All All
Operating System Apple Iphone Os All All All All
Operating System Apple Macos All All All All
Application Apple Safari All All All All

References

ReferenceSourceLinkTags
About the security content of Safari 16.4.1 - Apple Support MISC support.apple.com Release Notes
Full Disclosure: APPLE-SA-2023-04-07-3 Safari 16.4.1 FULLDISC seclists.org Mailing List, Release Notes
WebKitGTK+: Multiple Vulnerabilities (GLSA 202305-32) — Gentoo security GENTOO security.gentoo.org
About the security content of iOS 15.7.5 and iPadOS 15.7.5 - Apple Support MISC support.apple.com Release Notes
About the security content of macOS Ventura 13.3.1 - Apple Support MISC support.apple.com Release Notes
Debian -- Security Information -- DSA-5397-1 wpewebkit DEBIAN www.debian.org
About the security content of iOS 16.4.1 and iPadOS 16.4.1 - Apple Support MISC support.apple.com Release Notes
Full Disclosure: APPLE-SA-2023-04-07-2 macOS Ventura 13.3.1 FULLDISC seclists.org Mailing List, Release Notes
[SECURITY] Fedora 37 Update: webkitgtk-2.40.1-1.fc37 - package-announce - Fedora Mailing-Lists FEDORA lists.fedoraproject.org
[SECURITY] [DLA 3419-1] webkit2gtk security update MLIST lists.debian.org
oss-security - WebKitGTK and WPE WebKit Security Advisory WSA-2023-0003 MLIST www.openwall.com
[SECURITY] Fedora 36 Update: webkit2gtk3-2.40.1-1.fc36 - package-announce - Fedora Mailing-Lists FEDORA lists.fedoraproject.org
Full Disclosure: APPLE-SA-2023-04-10-1 iOS 15.7.5 and iPadOS 15.7.5 FULLDISC seclists.org Mailing List, Release Notes
Debian -- Security Information -- DSA-5396-1 webkit2gtk DEBIAN www.debian.org
[SECURITY] Fedora 38 Update: webkitgtk-2.40.1-1.fc38 - package-announce - Fedora Mailing-Lists FEDORA lists.fedoraproject.org
Full Disclosure: APPLE-SA-2023-04-07-1 iOS 16.4.1 and iPadOS 16.4.1 FULLDISC seclists.org Mailing List, Release Notes
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis
CISA Known Exploited Vulnerabilities catalog CISA www.cisa.gov kev

Legacy QID Mappings

  • 160560 Oracle Enterprise Linux Security Update for webkit2gtk3 (ELSA-2023-1918)
  • 160561 Oracle Enterprise Linux Security Update for webkit2gtk3 (ELSA-2023-1919)
  • 181769 Debian Security Update for wpewebkit (DSA 5397-1)
  • 181770 Debian Security Update for webkit2gtk (DSA 5396-1)
  • 181780 Debian Security Update for webkit2gtk (DLA 3419-1)
  • 182111 Debian Security Update for webkit2gtkwpewebkit (CVE-2023-28205)
  • 199324 Ubuntu Security Notification for WebKitGTK Vulnerabilities (USN-6061-1)
  • 241371 Red Hat Update for webkit2gtk3 (RHSA-2023:1918)
  • 241373 Red Hat Update for webkit2gtk3 (RHSA-2023:1919)
  • 283955 Fedora Security Update for webkitgtk (FEDORA-2023-a4bbf02a57)
  • 283958 Fedora Security Update for webkit2gtk3 (FEDORA-2023-8900b35c6f)
  • 284163 Fedora Security Update for webkitgtk (FEDORA-2023-5b61346bbe)
  • 355438 Amazon Linux Security Advisory for webkitgtk4 : ALAS2-2023-2088
  • 378364 Apple macOS Ventura 13.3.1 Not Installed (HT213721)
  • 378365 Apple Safari Security update (HT213722)
  • 378470 Alibaba Cloud Linux Security Update for webkit2gtk3 (ALINUX3-SA-2023:0040)
  • 610477 Apple iOS 16.4.1 and iPadOS 16.4.1 Security Update Missing (HT213720)
  • 610478 Apple iOS 15.7.5 and iPadOS 15.7.5 Security Update Missing (HT213723)
  • 710737 Gentoo Linux WebKitGTK+ Multiple Vulnerabilities (GLSA 202305-32)
  • 753948 SUSE Enterprise Linux Security Update for webkit2gtk3 (SUSE-SU-2023:2056-1)
  • 753959 SUSE Enterprise Linux Security Update for webkit2gtk3 (SUSE-SU-2023:2078-1)
  • 753960 SUSE Enterprise Linux Security Update for webkit2gtk3 (SUSE-SU-2023:2077-1)
  • 940992 AlmaLinux Security Update for webkit2gtk3 (ALSA-2023:1919)
  • 940995 AlmaLinux Security Update for webkit2gtk3 (ALSA-2023:1918)
  • 960912 Rocky Linux Security Update for webkit2gtk3 (RLSA-2023:1918)
  • 960915 Rocky Linux Security Update for webkit2gtk3 (RLSA-2023:1919)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report