{"api_version":"1","generated_at":"2026-04-23T04:34:03+00:00","cve":"CVE-2023-23508","urls":{"html":"https://cve.report/CVE-2023-23508","api":"https://cve.report/api/cve/CVE-2023-23508.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-23508","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-23508"},"summary":{"title":"CVE-2023-23508","description":"The issue was addressed with improved memory handling. This issue is fixed in macOS Big Sur 11.7.3, macOS Ventura 13.2, macOS Monterey 12.6.3. An app may be able to bypass Privacy preferences.","state":"PUBLIC","assigner":"product-security@apple.com","published_at":"2023-02-27 20:15:00","updated_at":"2023-07-27 04:15:00"},"problem_types":["NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"https://support.apple.com/en-us/HT213604","name":"https://support.apple.com/en-us/HT213604","refsource":"MISC","tags":[],"title":"About the security content of macOS Monterey 12.6.3 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/en-us/HT213603","name":"https://support.apple.com/en-us/HT213603","refsource":"MISC","tags":[],"title":"About the security content of macOS Big Sur 11.7.3 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/en-us/HT213605","name":"https://support.apple.com/en-us/HT213605","refsource":"MISC","tags":[],"title":"About the security content of macOS Ventura 13.2 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-23508","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-23508","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"23508","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"macos","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-23508","qid":"377926","title":"Apple macOS Big Sur 11.7.3 Not Installed (HT213603)"},{"cve":"CVE-2023-23508","qid":"377927","title":"Apple macOS Ventura 13.2 Not Installed (HT213605)"},{"cve":"CVE-2023-23508","qid":"377928","title":"Apple macOS Monterey 12.6.3 Not Installed (HT213604)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-23508","ASSIGNER":"product-security@apple.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"The issue was addressed with improved memory handling. This issue is fixed in macOS Big Sur 11.7.3, macOS Ventura 13.2, macOS Monterey 12.6.3. An app may be able to bypass Privacy preferences."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"An app may be able to bypass Privacy preferences"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Apple","product":{"product_data":[{"product_name":"macOS","version":{"version_data":[{"version_affected":"<","version_name":"unspecified","version_value":"11.7"}]}}]}}]}},"references":{"reference_data":[{"url":"https://support.apple.com/en-us/HT213603","refsource":"MISC","name":"https://support.apple.com/en-us/HT213603"},{"url":"https://support.apple.com/en-us/HT213605","refsource":"MISC","name":"https://support.apple.com/en-us/HT213605"},{"url":"https://support.apple.com/en-us/HT213604","refsource":"MISC","name":"https://support.apple.com/en-us/HT213604"}]}},"nvd":{"publishedDate":"2023-02-27 20:15:00","lastModifiedDate":"2023-07-27 04:15:00","problem_types":["NVD-CWE-noinfo"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":5.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":1.8,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionStartIncluding":"11.0","versionEndExcluding":"11.7.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionStartIncluding":"12.0.0","versionEndExcluding":"12.6.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionStartIncluding":"13.0","versionEndExcluding":"13.2","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}