{"api_version":"1","generated_at":"2026-04-23T03:26:29+00:00","cve":"CVE-2023-32393","urls":{"html":"https://cve.report/CVE-2023-32393","api":"https://cve.report/api/cve/CVE-2023-32393.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-32393","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-32393"},"summary":{"title":"CVE-2023-32393","description":"The issue was addressed with improved memory handling. This issue is fixed in watchOS 9.3, tvOS 16.3, macOS Ventura 13.2, iOS 16.3 and iPadOS 16.3. Processing web content may lead to arbitrary code execution.","state":"PUBLIC","assigner":"product-security@apple.com","published_at":"2023-07-27 01:15:00","updated_at":"2024-01-05 14:15:00"},"problem_types":["NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"https://support.apple.com/en-us/HT213599","name":"https://support.apple.com/en-us/HT213599","refsource":"MISC","tags":[],"title":"About the security content of watchOS 9.3 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/en-us/HT213605","name":"https://support.apple.com/en-us/HT213605","refsource":"MISC","tags":[],"title":"About the security content of macOS Ventura 13.2 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.gentoo.org/glsa/202401-04","name":"https://security.gentoo.org/glsa/202401-04","refsource":"","tags":[],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/en-us/HT213606","name":"https://support.apple.com/en-us/HT213606","refsource":"MISC","tags":[],"title":"About the security content of iOS 16.3 and iPadOS 16.3 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/en-us/HT213601","name":"https://support.apple.com/en-us/HT213601","refsource":"MISC","tags":[],"title":"About the security content of tvOS 16.3 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-32393","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-32393","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"32393","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"ipados","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"32393","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"iphone_os","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"32393","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"macos","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"32393","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"tvos","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"32393","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"watchos","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-32393","qid":"161084","title":"Oracle Enterprise Linux Security Update for webkit2gtk3 (ELSA-2023-6535)"},{"cve":"CVE-2023-32393","qid":"161167","title":"Oracle Enterprise Linux Security Update for webkit2gtk3 (ELSA-2023-7055)"},{"cve":"CVE-2023-32393","qid":"199627","title":"Ubuntu Security Notification for WebKitGTK Vulnerabilities (USN-6264-1)"},{"cve":"CVE-2023-32393","qid":"242303","title":"Red Hat Update for webkit2gtk3 (RHSA-2023:6535)"},{"cve":"CVE-2023-32393","qid":"242457","title":"Red Hat Update for webkit2gtk3 (RHSA-2023:7055)"},{"cve":"CVE-2023-32393","qid":"356402","title":"Amazon Linux Security Advisory for webkitgtk4 : ALAS2-2023-2270"},{"cve":"CVE-2023-32393","qid":"710824","title":"Gentoo Linux WebKitGTK+ Multiple Vulnerabilities (GLSA 202401-04)"},{"cve":"CVE-2023-32393","qid":"755164","title":"SUSE Enterprise Linux Security Update for webkit2gtk3 (SUSE-SU-2023:4211-1)"},{"cve":"CVE-2023-32393","qid":"755166","title":"SUSE Enterprise Linux Security Update for webkit2gtk3 (SUSE-SU-2023:4209-1)"},{"cve":"CVE-2023-32393","qid":"941362","title":"AlmaLinux Security Update for webkit2gtk3 (ALSA-2023:6535)"},{"cve":"CVE-2023-32393","qid":"941448","title":"AlmaLinux Security Update for webkit2gtk3 (ALSA-2023:7055)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-32393","ASSIGNER":"product-security@apple.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"The issue was addressed with improved memory handling. This issue is fixed in watchOS 9.3, tvOS 16.3, macOS Ventura 13.2, iOS 16.3 and iPadOS 16.3. Processing web content may lead to arbitrary code execution."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Processing web content may lead to arbitrary code execution"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Apple","product":{"product_data":[{"product_name":"iOS and iPadOS","version":{"version_data":[{"version_affected":"<","version_name":"unspecified","version_value":"16.3"}]}},{"product_name":"tvOS","version":{"version_data":[{"version_affected":"<","version_name":"unspecified","version_value":"16.3"}]}},{"product_name":"macOS","version":{"version_data":[{"version_affected":"<","version_name":"unspecified","version_value":"13.2"}]}},{"product_name":"watchOS","version":{"version_data":[{"version_affected":"<","version_name":"unspecified","version_value":"9.3"}]}}]}}]}},"references":{"reference_data":[{"url":"https://support.apple.com/en-us/HT213606","refsource":"MISC","name":"https://support.apple.com/en-us/HT213606"},{"url":"https://support.apple.com/en-us/HT213601","refsource":"MISC","name":"https://support.apple.com/en-us/HT213601"},{"url":"https://support.apple.com/en-us/HT213605","refsource":"MISC","name":"https://support.apple.com/en-us/HT213605"},{"url":"https://support.apple.com/en-us/HT213599","refsource":"MISC","name":"https://support.apple.com/en-us/HT213599"}]}},"nvd":{"publishedDate":"2023-07-27 01:15:00","lastModifiedDate":"2024-01-05 14:15:00","problem_types":["NVD-CWE-noinfo"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionStartIncluding":"13.0","versionEndExcluding":"13.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*","versionEndExcluding":"9.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*","versionEndExcluding":"16.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*","versionEndExcluding":"16.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","versionEndExcluding":"16.3","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}