Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2023-42838

An access issue was addressed with improvements to the sandbox. This issue is fixed in macOS Ventura 13.6.3, macOS Sonoma 14.1, macOS Monterey 12.7.2. An app may be able to execute arbitrary code out of its sandbox or with certain elevated privileges.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 8.2%
CVSS Severity
CVSS v3 Score 8.6
Products affected by CVE-2023-42838
  • Apple » Macos » Version: 12.0
    cpe:2.3:o:apple:macos:12.0
  • Apple » Macos » Version: 12.0.0
    cpe:2.3:o:apple:macos:12.0.0
  • Apple » Macos » Version: 12.0.1
    cpe:2.3:o:apple:macos:12.0.1
  • Apple » Macos » Version: 12.1
    cpe:2.3:o:apple:macos:12.1
  • Apple » Macos » Version: 12.2
    cpe:2.3:o:apple:macos:12.2
  • Apple » Macos » Version: 12.2.1
    cpe:2.3:o:apple:macos:12.2.1
  • Apple » Macos » Version: 12.3
    cpe:2.3:o:apple:macos:12.3
  • Apple » Macos » Version: 12.3.1
    cpe:2.3:o:apple:macos:12.3.1
  • Apple » Macos » Version: 12.4
    cpe:2.3:o:apple:macos:12.4
  • Apple » Macos » Version: 12.5
    cpe:2.3:o:apple:macos:12.5
  • Apple » Macos » Version: 12.5.1
    cpe:2.3:o:apple:macos:12.5.1
  • Apple » Macos » Version: 12.6
    cpe:2.3:o:apple:macos:12.6
  • Apple » Macos » Version: 12.6.1
    cpe:2.3:o:apple:macos:12.6.1
  • Apple » Macos » Version: 12.6.2
    cpe:2.3:o:apple:macos:12.6.2
  • Apple » Macos » Version: 12.6.3
    cpe:2.3:o:apple:macos:12.6.3
  • Apple » Macos » Version: 12.6.4
    cpe:2.3:o:apple:macos:12.6.4
  • Apple » Macos » Version: 12.6.5
    cpe:2.3:o:apple:macos:12.6.5
  • Apple » Macos » Version: 12.6.6
    cpe:2.3:o:apple:macos:12.6.6
  • Apple » Macos » Version: 12.6.7
    cpe:2.3:o:apple:macos:12.6.7
  • Apple » Macos » Version: 12.6.8
    cpe:2.3:o:apple:macos:12.6.8
  • Apple » Macos » Version: 12.6.9
    cpe:2.3:o:apple:macos:12.6.9
  • Apple » Macos » Version: 12.7
    cpe:2.3:o:apple:macos:12.7
  • Apple » Macos » Version: 12.7.1
    cpe:2.3:o:apple:macos:12.7.1
  • Apple » Macos » Version: 13.0
    cpe:2.3:o:apple:macos:13.0
  • Apple » Macos » Version: 13.0.0
    cpe:2.3:o:apple:macos:13.0.0
  • Apple » Macos » Version: 13.0.1
    cpe:2.3:o:apple:macos:13.0.1
  • Apple » Macos » Version: 13.1
    cpe:2.3:o:apple:macos:13.1
  • Apple » Macos » Version: 13.2
    cpe:2.3:o:apple:macos:13.2
  • Apple » Macos » Version: 13.2.1
    cpe:2.3:o:apple:macos:13.2.1
  • Apple » Macos » Version: 13.3
    cpe:2.3:o:apple:macos:13.3
  • Apple » Macos » Version: 13.3.1
    cpe:2.3:o:apple:macos:13.3.1
  • Apple » Macos » Version: 13.3.3
    cpe:2.3:o:apple:macos:13.3.3
  • Apple » Macos » Version: 13.4
    cpe:2.3:o:apple:macos:13.4
  • Apple » Macos » Version: 13.4.1
    cpe:2.3:o:apple:macos:13.4.1
  • Apple » Macos » Version: 13.5
    cpe:2.3:o:apple:macos:13.5
  • Apple » Macos » Version: 13.5.2
    cpe:2.3:o:apple:macos:13.5.2
  • Apple » Macos » Version: 13.6
    cpe:2.3:o:apple:macos:13.6
  • Apple » Macos » Version: 13.6.1
    cpe:2.3:o:apple:macos:13.6.1
  • Apple » Macos » Version: 13.6.2
    cpe:2.3:o:apple:macos:13.6.2
  • Apple » Macos » Version: 14.0
    cpe:2.3:o:apple:macos:14.0


Contact Us

Shodan ® - All rights reserved