{"api_version":"1","generated_at":"2026-04-23T04:21:35+00:00","cve":"CVE-2023-42852","urls":{"html":"https://cve.report/CVE-2023-42852","api":"https://cve.report/api/cve/CVE-2023-42852.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-42852","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-42852"},"summary":{"title":"CVE-2023-42852","description":"A logic issue was addressed with improved checks. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. Processing web content may lead to arbitrary code execution.","state":"PUBLIC","assigner":"product-security@apple.com","published_at":"2023-10-25 19:15:00","updated_at":"2024-01-31 15:15:00"},"problem_types":["NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"http://www.openwall.com/lists/oss-security/2023/11/15/1","name":"http://www.openwall.com/lists/oss-security/2023/11/15/1","refsource":"","tags":[],"title":"","mime":"","httpstatus":"200","archivestatus":"404"},{"url":"http://seclists.org/fulldisclosure/2023/Oct/19","name":"http://seclists.org/fulldisclosure/2023/Oct/19","refsource":"MISC","tags":[],"title":"Full Disclosure: APPLE-SA-10-25-2023-1 iOS 17.1 and iPadOS 17.1","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://support.apple.com/kb/HT213984","name":"https://support.apple.com/kb/HT213984","refsource":"","tags":[],"title":"About the security content of macOS Sonoma 14.1 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://seclists.org/fulldisclosure/2023/Oct/25","name":"http://seclists.org/fulldisclosure/2023/Oct/25","refsource":"MISC","tags":[],"title":"Full Disclosure: APPLE-SA-10-25-2023-8 watchOS 10.1","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://security.gentoo.org/glsa/202401-33","name":"https://security.gentoo.org/glsa/202401-33","refsource":"","tags":[],"title":"WebKitGTK+: Multiple Vulnerabilities (GLSA 202401-33) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://seclists.org/fulldisclosure/2023/Oct/23","name":"http://seclists.org/fulldisclosure/2023/Oct/23","refsource":"MISC","tags":[],"title":"Full Disclosure: APPLE-SA-10-25-2023-2 iOS 16.7.2 and iPadOS 16.7.2","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.debian.org/security/2023/dsa-5557","name":"https://www.debian.org/security/2023/dsa-5557","refsource":"","tags":[],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/en-us/HT213982","name":"https://support.apple.com/en-us/HT213982","refsource":"MISC","tags":[],"title":"About the security content of iOS 17.1 and iPadOS 17.1 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"429"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTCZGQPRDAOPP6NK4CIDJKIPMBWD5J7K/","name":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTCZGQPRDAOPP6NK4CIDJKIPMBWD5J7K/","refsource":"","tags":[],"title":"[SECURITY] Fedora 37 Update: webkitgtk-2.42.2-1.fc37 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://support.apple.com/en-us/HT213984","name":"https://support.apple.com/en-us/HT213984","refsource":"MISC","tags":[],"title":"About the security content of macOS Sonoma 14.1 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"429"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S3O7ITSBZDHLBM5OG22K6RZAHRRTGECM/","name":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S3O7ITSBZDHLBM5OG22K6RZAHRRTGECM/","refsource":"","tags":[],"title":"","mime":"","httpstatus":"200","archivestatus":"404"},{"url":"http://seclists.org/fulldisclosure/2023/Oct/27","name":"http://seclists.org/fulldisclosure/2023/Oct/27","refsource":"MISC","tags":[],"title":"Full Disclosure: APPLE-SA-10-25-2023-9 Safari 17.1","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://support.apple.com/en-us/HT213988","name":"https://support.apple.com/en-us/HT213988","refsource":"MISC","tags":[],"title":"About the security content of watchOS 10.1 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"429"},{"url":"https://support.apple.com/en-us/HT213986","name":"https://support.apple.com/en-us/HT213986","refsource":"MISC","tags":[],"title":"About the security content of Safari 17.1 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"429"},{"url":"https://support.apple.com/en-us/HT213981","name":"https://support.apple.com/en-us/HT213981","refsource":"MISC","tags":[],"title":"About the security content of iOS 16.7.2 and iPadOS 16.7.2 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"429"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPPMOWFYZODONTA3RLZOKSGNR4DELGG2/","name":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPPMOWFYZODONTA3RLZOKSGNR4DELGG2/","refsource":"","tags":[],"title":"","mime":"","httpstatus":"200","archivestatus":"404"},{"url":"http://seclists.org/fulldisclosure/2023/Oct/24","name":"http://seclists.org/fulldisclosure/2023/Oct/24","refsource":"MISC","tags":[],"title":"Full Disclosure: APPLE-SA-10-25-2023-4 macOS Sonoma 14.1","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://seclists.org/fulldisclosure/2023/Oct/22","name":"http://seclists.org/fulldisclosure/2023/Oct/22","refsource":"MISC","tags":[],"title":"Full Disclosure: APPLE-SA-10-25-2023-7 tvOS 17.1","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://support.apple.com/en-us/HT213987","name":"https://support.apple.com/en-us/HT213987","refsource":"MISC","tags":[],"title":"About the security content of tvOS 17.1 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"429"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-42852","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-42852","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"42852","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"ipados","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"42852","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"iphone_os","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"42852","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"macos","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"42852","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apple","cpe5":"safari","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"42852","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"tvos","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"42852","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"watchos","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-42852","qid":"199922","title":"Ubuntu Security Notification for WebKitGTK Vulnerabilities (USN-6490-1)"},{"cve":"CVE-2023-42852","qid":"284735","title":"Fedora Security Update for webkitgtk (FEDORA-2023-cb3cacfef8)"},{"cve":"CVE-2023-42852","qid":"284770","title":"Fedora Security Update for webkitgtk (FEDORA-2023-11aaf99627)"},{"cve":"CVE-2023-42852","qid":"285123","title":"Fedora Security Update for webkitgtk (FEDORA-2023-8f84dc8e09)"},{"cve":"CVE-2023-42852","qid":"357018","title":"Amazon Linux Security Advisory for webkitgtk4 : ALAS2-2024-2427"},{"cve":"CVE-2023-42852","qid":"378968","title":"Apple Safari Multiple Vulnerabilities (HT213986)"},{"cve":"CVE-2023-42852","qid":"378975","title":"Apple MacOS Sonoma 14.1 Not Installed (HT213984)"},{"cve":"CVE-2023-42852","qid":"6000328","title":"Debian Security Update for webkit2gtk (DSA 5557-1)"},{"cve":"CVE-2023-42852","qid":"610521","title":"Apple iOS 17.1 and iPadOS 17.1 Security Update Missing (HT213982)"},{"cve":"CVE-2023-42852","qid":"610523","title":"Apple iOS 16.7.2 and iPadOS 16.7.2 Security Update Missing (HT213981)"},{"cve":"CVE-2023-42852","qid":"710848","title":"Gentoo Linux WebKitGTK+ Multiple Vulnerabilities (GLSA 202401-33)"},{"cve":"CVE-2023-42852","qid":"755335","title":"SUSE Enterprise Linux Security Update for webkit2gtk3 (SUSE-SU-2023:4561-1)"},{"cve":"CVE-2023-42852","qid":"755337","title":"SUSE Enterprise Linux Security Update for webkit2gtk3 (SUSE-SU-2023:4559-1)"},{"cve":"CVE-2023-42852","qid":"755338","title":"SUSE Enterprise Linux Security Update for webkit2gtk3 (SUSE-SU-2023:4558-1)"},{"cve":"CVE-2023-42852","qid":"755459","title":"SUSE Enterprise Linux Security Update for webkit2gtk3 (SUSE-SU-2023:4651-1)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-42852","ASSIGNER":"product-security@apple.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"A logic issue was addressed with improved checks. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. Processing web content may lead to arbitrary code execution."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Processing web content may lead to arbitrary code execution"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Apple","product":{"product_data":[{"product_name":"iOS and iPadOS","version":{"version_data":[{"version_affected":"<","version_name":"unspecified","version_value":"16.7"}]}},{"product_name":"Safari","version":{"version_data":[{"version_affected":"<","version_name":"unspecified","version_value":"17.1"}]}},{"product_name":"tvOS","version":{"version_data":[{"version_affected":"<","version_name":"unspecified","version_value":"17.1"}]}},{"product_name":"macOS","version":{"version_data":[{"version_affected":"<","version_name":"unspecified","version_value":"14.1"}]}},{"product_name":"watchOS","version":{"version_data":[{"version_affected":"<","version_name":"unspecified","version_value":"10.1"}]}}]}}]}},"references":{"reference_data":[{"url":"https://support.apple.com/en-us/HT213981","refsource":"MISC","name":"https://support.apple.com/en-us/HT213981"},{"url":"https://support.apple.com/en-us/HT213986","refsource":"MISC","name":"https://support.apple.com/en-us/HT213986"},{"url":"https://support.apple.com/en-us/HT213987","refsource":"MISC","name":"https://support.apple.com/en-us/HT213987"},{"url":"https://support.apple.com/en-us/HT213984","refsource":"MISC","name":"https://support.apple.com/en-us/HT213984"},{"url":"https://support.apple.com/en-us/HT213988","refsource":"MISC","name":"https://support.apple.com/en-us/HT213988"},{"url":"https://support.apple.com/en-us/HT213982","refsource":"MISC","name":"https://support.apple.com/en-us/HT213982"},{"url":"http://seclists.org/fulldisclosure/2023/Oct/23","refsource":"MISC","name":"http://seclists.org/fulldisclosure/2023/Oct/23"},{"url":"http://seclists.org/fulldisclosure/2023/Oct/22","refsource":"MISC","name":"http://seclists.org/fulldisclosure/2023/Oct/22"},{"url":"http://seclists.org/fulldisclosure/2023/Oct/19","refsource":"MISC","name":"http://seclists.org/fulldisclosure/2023/Oct/19"},{"url":"http://seclists.org/fulldisclosure/2023/Oct/27","refsource":"MISC","name":"http://seclists.org/fulldisclosure/2023/Oct/27"},{"url":"http://seclists.org/fulldisclosure/2023/Oct/24","refsource":"MISC","name":"http://seclists.org/fulldisclosure/2023/Oct/24"},{"url":"http://seclists.org/fulldisclosure/2023/Oct/25","refsource":"MISC","name":"http://seclists.org/fulldisclosure/2023/Oct/25"}]}},"nvd":{"publishedDate":"2023-10-25 19:15:00","lastModifiedDate":"2024-01-31 15:15:00","problem_types":["NVD-CWE-noinfo"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionStartIncluding":"14.0","versionEndExcluding":"14.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","versionStartIncluding":"17.0","versionEndExcluding":"17.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*","versionEndExcluding":"16.7.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","versionEndExcluding":"16.7.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*","versionEndExcluding":"10.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*","versionStartIncluding":"17.0","versionEndExcluding":"17.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*","versionEndExcluding":"17.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*","versionEndExcluding":"17.1","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}