{"api_version":"1","generated_at":"2026-04-16T00:04:56+00:00","cve":"CVE-2023-41064","urls":{"html":"https://cve.report/CVE-2023-41064","api":"https://cve.report/api/cve/CVE-2023-41064.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-41064","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-41064"},"summary":{"title":"Apple iOS, iPadOS, and macOS ImageIO Buffer Overflow Vulnerability","description":"A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 16.6.1 and iPadOS 16.6.1, macOS Monterey 12.6.9, macOS Ventura 13.5.2, iOS 15.7.9 and iPadOS 15.7.9, macOS Big Sur 11.7.10. Processing a maliciously crafted image may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.","state":"PUBLIC","assigner":"product-security@apple.com","published_at":"2023-09-07 18:15:00","updated_at":"2023-09-22 00:15:00"},"problem_types":["CWE-120"],"metrics":[],"references":[{"url":"https://support.apple.com/kb/HT213914","name":"https://support.apple.com/kb/HT213914","refsource":"MISC","tags":[],"title":"About the security content of macOS Monterey 12.6.9 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://support.apple.com/kb/HT213905","name":"https://support.apple.com/kb/HT213905","refsource":"MISC","tags":[],"title":"About the security content of iOS 16.6.1 and iPadOS 16.6.1 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://support.apple.com/en-us/HT213906","name":"https://support.apple.com/en-us/HT213906","refsource":"MISC","tags":[],"title":"About the security content of macOS Ventura 13.5.2 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://seclists.org/fulldisclosure/2023/Sep/9","name":"http://seclists.org/fulldisclosure/2023/Sep/9","refsource":"MISC","tags":[],"title":"Full Disclosure: APPLE-SA-2023-09-11-3 macOS Big Sur 11.7.10","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://seclists.org/fulldisclosure/2023/Sep/4","name":"http://seclists.org/fulldisclosure/2023/Sep/4","refsource":"MISC","tags":[],"title":"Full Disclosure: APPLE-SA-2023-09-07-2 iOS 16.6.1 and iPadOS 16.6.1","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://support.apple.com/kb/HT213913","name":"https://support.apple.com/kb/HT213913","refsource":"MISC","tags":[],"title":"About the security content of iOS 15.7.9 and iPadOS 15.7.9 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://support.apple.com/en-us/HT213905","name":"https://support.apple.com/en-us/HT213905","refsource":"MISC","tags":[],"title":"About the security content of iOS 16.6.1 and iPadOS 16.6.1 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://seclists.org/fulldisclosure/2023/Sep/8","name":"http://seclists.org/fulldisclosure/2023/Sep/8","refsource":"MISC","tags":[],"title":"Full Disclosure: APPLE-SA-2023-09-11-2 macOS Monterey 12.6.9","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://support.apple.com/kb/HT213906","name":"https://support.apple.com/kb/HT213906","refsource":"MISC","tags":[],"title":"About the security content of macOS Ventura 13.5.2 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://seclists.org/fulldisclosure/2023/Sep/7","name":"http://seclists.org/fulldisclosure/2023/Sep/7","refsource":"MISC","tags":[],"title":"Full Disclosure: APPLE-SA-2023-09-11-1 iOS 15.7.9 and iPadOS 15.7.9","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://seclists.org/fulldisclosure/2023/Sep/3","name":"http://seclists.org/fulldisclosure/2023/Sep/3","refsource":"MISC","tags":[],"title":"Full Disclosure: APPLE-SA-2023-09-07-1 macOS Ventura 13.5.2","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://support.apple.com/kb/HT213915","name":"https://support.apple.com/kb/HT213915","refsource":"MISC","tags":[],"title":"About the security content of macOS Big Sur 11.7.10 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2023/09/21/4","name":"http://www.openwall.com/lists/oss-security/2023/09/21/4","refsource":"MISC","tags":[],"title":"oss-security - CVE-2023-4863: libwebp: Heap buffer overflow in WebP Codec","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://support.apple.com/en-us/HT213915","name":"https://support.apple.com/en-us/HT213915","refsource":"MISC","tags":[],"title":"About the security content of macOS Big Sur 11.7.10 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://support.apple.com/en-us/HT213914","name":"https://support.apple.com/en-us/HT213914","refsource":"MISC","tags":[],"title":"About the security content of macOS Monterey 12.6.9 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://support.apple.com/en-us/HT213913","name":"https://support.apple.com/en-us/HT213913","refsource":"MISC","tags":[],"title":"About the security content of iOS 15.7.9 and iPadOS 15.7.9 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-41064","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-41064","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"41064","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"ipados","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"41064","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"iphone_os","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"41064","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"macos","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":{"cve_year":"2023","cve_id":"41064","cve":"CVE-2023-41064","vendorProject":"Apple","product":"iOS, iPadOS, and macOS","vulnerabilityName":"Apple iOS, iPadOS, and macOS ImageIO Buffer Overflow Vulnerability","dateAdded":"2023-09-11","shortDescription":"Apple iOS, iPadOS, and macOS contain a buffer overflow vulnerability in ImageIO when processing a maliciously crafted image, which may lead to code execution. This vulnerability was chained with CVE-2023-41061.","requiredAction":"Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.","dueDate":"2023-10-02","knownRansomwareCampaignUse":"Unknown","notes":"https://support.apple.com/en-us/HT213905, https://support.apple.com/en-us/HT213906; https://nvd.nist.gov/vuln/detail/CVE-2023-41064","cwes":"CWE-120","catalogVersion":"2026.04.14","updated_at":"2026-04-14 17:41:16"},"epss":{"cve_year":"2023","cve_id":"41064","cve":"CVE-2023-41064","epss":"0.853530000","percentile":"0.993640000","score_date":"2026-04-14","updated_at":"2026-04-15 00:18:09"},"legacy_qids":[{"cve":"CVE-2023-41064","qid":"610526","title":"Apple iOS 15.7.9 and iPadOS 15.7.9 Security Update Missing (HT213913)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-41064","ASSIGNER":"product-security@apple.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 16.6.1 and iPadOS 16.6.1, macOS Monterey 12.6.9, macOS Ventura 13.5.2, iOS 15.7.9 and iPadOS 15.7.9, macOS Big Sur 11.7.10. Processing a maliciously crafted image may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Processing a maliciously crafted image may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited."}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Apple","product":{"product_data":[{"product_name":"macOS","version":{"version_data":[{"version_affected":"<","version_name":"unspecified","version_value":"12.6"}]}},{"product_name":"iOS and iPadOS","version":{"version_data":[{"version_affected":"<","version_name":"unspecified","version_value":"16.6"}]}}]}}]}},"references":{"reference_data":[{"url":"https://support.apple.com/en-us/HT213914","refsource":"MISC","name":"https://support.apple.com/en-us/HT213914"},{"url":"https://support.apple.com/en-us/HT213915","refsource":"MISC","name":"https://support.apple.com/en-us/HT213915"},{"url":"https://support.apple.com/en-us/HT213905","refsource":"MISC","name":"https://support.apple.com/en-us/HT213905"},{"url":"https://support.apple.com/en-us/HT213913","refsource":"MISC","name":"https://support.apple.com/en-us/HT213913"},{"url":"https://support.apple.com/en-us/HT213906","refsource":"MISC","name":"https://support.apple.com/en-us/HT213906"},{"url":"http://www.openwall.com/lists/oss-security/2023/09/21/4","refsource":"MISC","name":"http://www.openwall.com/lists/oss-security/2023/09/21/4"}]}},"nvd":{"publishedDate":"2023-09-07 18:15:00","lastModifiedDate":"2023-09-22 00:15:00","problem_types":["CWE-120"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*","versionEndExcluding":"15.7.9","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","versionEndExcluding":"15.7.9","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionEndExcluding":"12.6.9","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*","versionStartIncluding":"16.0","versionEndExcluding":"16.6.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionStartIncluding":"11.0","versionEndExcluding":"11.7.10","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","versionStartIncluding":"16.0","versionEndExcluding":"16.6.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionStartIncluding":"13.0","versionEndExcluding":"13.5.2","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}