{"api_version":"1","generated_at":"2026-04-23T06:20:29+00:00","cve":"CVE-2023-27937","urls":{"html":"https://cve.report/CVE-2023-27937","api":"https://cve.report/api/cve/CVE-2023-27937.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-27937","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-27937"},"summary":{"title":"CVE-2023-27937","description":"An integer overflow was addressed with improved input validation. This issue is fixed in macOS Ventura 13.3, iOS 16.4 and iPadOS 16.4, macOS Big Sur 11.7.5, macOS Monterey 12.6.4, tvOS 16.4, watchOS 9.4. Parsing a maliciously crafted plist may lead to an unexpected app termination or arbitrary code execution.","state":"PUBLIC","assigner":"product-security@apple.com","published_at":"2023-05-08 20:15:00","updated_at":"2023-07-27 04:15:00"},"problem_types":["CWE-190"],"metrics":[],"references":[{"url":"https://support.apple.com/en-us/HT213670","name":"https://support.apple.com/en-us/HT213670","refsource":"MISC","tags":[],"title":"About the security content of macOS Ventura 13.3 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/en-us/HT213677","name":"https://support.apple.com/en-us/HT213677","refsource":"MISC","tags":[],"title":"About the security content of macOS Monterey 12.6.4 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/en-us/HT213676","name":"https://support.apple.com/en-us/HT213676","refsource":"MISC","tags":[],"title":"About the security content of iOS 16.4 and iPadOS 16.4 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/en-us/HT213678","name":"https://support.apple.com/en-us/HT213678","refsource":"MISC","tags":[],"title":"About the security content of watchOS 9.4 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/en-us/HT213674","name":"https://support.apple.com/en-us/HT213674","refsource":"MISC","tags":[],"title":"About the security content of tvOS 16.4 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/en-us/HT213675","name":"https://support.apple.com/en-us/HT213675","refsource":"MISC","tags":[],"title":"About the security content of macOS Big Sur 11.7.5 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-27937","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-27937","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"27937","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"ipados","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"27937","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"iphone_os","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"27937","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"macos","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"27937","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"tvos","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"27937","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"watchos","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-27937","qid":"378188","title":"Apple macOS Big Sur 11.7.5 Not Installed (HT213675)"},{"cve":"CVE-2023-27937","qid":"378189","title":"Apple macOS Ventura 13.3 Not Installed (HT213670)"},{"cve":"CVE-2023-27937","qid":"378190","title":"Apple macOS Monterey 12.6.4 Not Installed (HT213677)"},{"cve":"CVE-2023-27937","qid":"610475","title":"Apple iOS 16.4 and iPadOS 16.4 Security Update Missing"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-27937","ASSIGNER":"product-security@apple.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"An integer overflow was addressed with improved input validation. This issue is fixed in macOS Ventura 13.3, iOS 16.4 and iPadOS 16.4, macOS Big Sur 11.7.5, macOS Monterey 12.6.4, tvOS 16.4, watchOS 9.4. Parsing a maliciously crafted plist may lead to an unexpected app termination or arbitrary code execution."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Parsing a maliciously crafted plist may lead to an unexpected app termination or arbitrary code execution"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Apple","product":{"product_data":[{"product_name":"macOS","version":{"version_data":[{"version_affected":"<","version_name":"unspecified","version_value":"13.3"}]}},{"product_name":"iOS and iPadOS","version":{"version_data":[{"version_affected":"<","version_name":"unspecified","version_value":"16.4"}]}},{"product_name":"watchOS","version":{"version_data":[{"version_affected":"<","version_name":"unspecified","version_value":"9.4"}]}},{"product_name":"tvOS","version":{"version_data":[{"version_affected":"<","version_name":"unspecified","version_value":"16.4"}]}}]}}]}},"references":{"reference_data":[{"url":"https://support.apple.com/en-us/HT213670","refsource":"MISC","name":"https://support.apple.com/en-us/HT213670"},{"url":"https://support.apple.com/en-us/HT213676","refsource":"MISC","name":"https://support.apple.com/en-us/HT213676"},{"url":"https://support.apple.com/en-us/HT213677","refsource":"MISC","name":"https://support.apple.com/en-us/HT213677"},{"url":"https://support.apple.com/en-us/HT213678","refsource":"MISC","name":"https://support.apple.com/en-us/HT213678"},{"url":"https://support.apple.com/en-us/HT213674","refsource":"MISC","name":"https://support.apple.com/en-us/HT213674"},{"url":"https://support.apple.com/en-us/HT213675","refsource":"MISC","name":"https://support.apple.com/en-us/HT213675"}]}},"nvd":{"publishedDate":"2023-05-08 20:15:00","lastModifiedDate":"2023-07-27 04:15:00","problem_types":["CWE-190"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionStartIncluding":"13.0","versionEndExcluding":"13.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","versionEndExcluding":"16.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*","versionEndExcluding":"16.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*","versionEndExcluding":"16.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*","versionEndExcluding":"9.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionStartIncluding":"12.0","versionEndExcluding":"12.6.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionEndExcluding":"11.7.5","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}