{"api_version":"1","generated_at":"2026-04-22T23:53:42+00:00","cve":"CVE-2023-36495","urls":{"html":"https://cve.report/CVE-2023-36495","api":"https://cve.report/api/cve/CVE-2023-36495.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-36495","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-36495"},"summary":{"title":"CVE-2023-36495","description":"An integer overflow was addressed with improved input validation. This issue is fixed in watchOS 9.6, macOS Monterey 12.6.8, iOS 15.7.8 and iPadOS 15.7.8, tvOS 16.6, iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5. An app may be able to execute arbitrary code with kernel privileges.","state":"PUBLIC","assigner":"product-security@apple.com","published_at":"2023-07-28 05:15:00","updated_at":"2023-08-03 16:59:00"},"problem_types":["CWE-190"],"metrics":[],"references":[{"url":"https://support.apple.com/kb/HT213841","name":"https://support.apple.com/kb/HT213841","refsource":"MISC","tags":[],"title":"About the security content of iOS 16.6 and iPadOS 16.6 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/kb/HT213846","name":"https://support.apple.com/kb/HT213846","refsource":"MISC","tags":[],"title":"About the security content of tvOS 16.6 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/kb/HT213848","name":"https://support.apple.com/kb/HT213848","refsource":"MISC","tags":[],"title":"About the security content of watchOS 9.6 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/kb/HT213842","name":"https://support.apple.com/kb/HT213842","refsource":"MISC","tags":[],"title":"About the security content of iOS 15.7.8 and iPadOS 15.7.8 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/kb/HT213844","name":"https://support.apple.com/kb/HT213844","refsource":"MISC","tags":[],"title":"About the security content of macOS Monterey 12.6.8 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/en-us/HT213844","name":"https://support.apple.com/en-us/HT213844","refsource":"MISC","tags":[],"title":"About the security content of macOS Monterey 12.6.8 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/en-us/HT213843","name":"https://support.apple.com/en-us/HT213843","refsource":"MISC","tags":[],"title":"About the security content of macOS Ventura 13.5 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/en-us/HT213842","name":"https://support.apple.com/en-us/HT213842","refsource":"MISC","tags":[],"title":"About the security content of iOS 15.7.8 and iPadOS 15.7.8 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/kb/HT213843","name":"https://support.apple.com/kb/HT213843","refsource":"MISC","tags":[],"title":"About the security content of macOS Ventura 13.5 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/en-us/HT213848","name":"https://support.apple.com/en-us/HT213848","refsource":"MISC","tags":[],"title":"About the security content of watchOS 9.6 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/en-us/HT213846","name":"https://support.apple.com/en-us/HT213846","refsource":"MISC","tags":[],"title":"About the security content of tvOS 16.6 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/en-us/HT213841","name":"https://support.apple.com/en-us/HT213841","refsource":"MISC","tags":[],"title":"About the security content of iOS 16.6 and iPadOS 16.6 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-36495","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-36495","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"36495","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"ipados","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"36495","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"iphone_os","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"36495","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"macos","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"36495","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"tvos","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"36495","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"watchos","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-36495","qid":"378687","title":"Apple macOS Ventura 13.5 Not Installed (HT213843)"},{"cve":"CVE-2023-36495","qid":"378688","title":"Apple macOS Monterey 12.6.8 Not Installed (HT213844)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-36495","ASSIGNER":"product-security@apple.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"An integer overflow was addressed with improved input validation. This issue is fixed in watchOS 9.6, macOS Monterey 12.6.8, iOS 15.7.8 and iPadOS 15.7.8, tvOS 16.6, iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5. An app may be able to execute arbitrary code with kernel privileges."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"An app may be able to execute arbitrary code with kernel privileges"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Apple","product":{"product_data":[{"product_name":"tvOS","version":{"version_data":[{"version_affected":"<","version_name":"unspecified","version_value":"16.6"}]}},{"product_name":"iOS and iPadOS","version":{"version_data":[{"version_affected":"<","version_name":"unspecified","version_value":"16.6"}]}},{"product_name":"macOS","version":{"version_data":[{"version_affected":"<","version_name":"unspecified","version_value":"13.5"}]}},{"product_name":"watchOS","version":{"version_data":[{"version_affected":"<","version_name":"unspecified","version_value":"9.6"}]}}]}}]}},"references":{"reference_data":[{"url":"https://support.apple.com/en-us/HT213846","refsource":"MISC","name":"https://support.apple.com/en-us/HT213846"},{"url":"https://support.apple.com/en-us/HT213841","refsource":"MISC","name":"https://support.apple.com/en-us/HT213841"},{"url":"https://support.apple.com/en-us/HT213843","refsource":"MISC","name":"https://support.apple.com/en-us/HT213843"},{"url":"https://support.apple.com/en-us/HT213842","refsource":"MISC","name":"https://support.apple.com/en-us/HT213842"},{"url":"https://support.apple.com/en-us/HT213844","refsource":"MISC","name":"https://support.apple.com/en-us/HT213844"},{"url":"https://support.apple.com/en-us/HT213848","refsource":"MISC","name":"https://support.apple.com/en-us/HT213848"},{"url":"https://support.apple.com/kb/HT213843","refsource":"MISC","name":"https://support.apple.com/kb/HT213843"},{"url":"https://support.apple.com/kb/HT213844","refsource":"MISC","name":"https://support.apple.com/kb/HT213844"},{"url":"https://support.apple.com/kb/HT213841","refsource":"MISC","name":"https://support.apple.com/kb/HT213841"},{"url":"https://support.apple.com/kb/HT213846","refsource":"MISC","name":"https://support.apple.com/kb/HT213846"},{"url":"https://support.apple.com/kb/HT213842","refsource":"MISC","name":"https://support.apple.com/kb/HT213842"},{"url":"https://support.apple.com/kb/HT213848","refsource":"MISC","name":"https://support.apple.com/kb/HT213848"}]}},"nvd":{"publishedDate":"2023-07-28 05:15:00","lastModifiedDate":"2023-08-03 16:59:00","problem_types":["CWE-190"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*","versionEndExcluding":"15.7.8","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","versionEndExcluding":"15.7.8","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionStartIncluding":"13.0","versionEndExcluding":"13.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionStartIncluding":"12.0","versionEndExcluding":"12.6.8","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*","versionEndExcluding":"9.6","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*","versionEndExcluding":"16.6","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*","versionStartIncluding":"16.0","versionEndExcluding":"16.6","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","versionStartIncluding":"16.0","versionEndExcluding":"16.6","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}