Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2023-42892

A use-after-free issue was addressed with improved memory management. This issue is fixed in macOS Ventura 13.6.3, macOS Sonoma 14.2, macOS Monterey 12.7.2. A local attacker may be able to elevate their privileges.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 29.2%
CVSS Severity
CVSS v3 Score 7.8
Products affected by CVE-2023-42892
  • Apple » Macos » Version: 12.0
    cpe:2.3:o:apple:macos:12.0
  • Apple » Macos » Version: 12.0.0
    cpe:2.3:o:apple:macos:12.0.0
  • Apple » Macos » Version: 12.0.1
    cpe:2.3:o:apple:macos:12.0.1
  • Apple » Macos » Version: 12.1
    cpe:2.3:o:apple:macos:12.1
  • Apple » Macos » Version: 12.2
    cpe:2.3:o:apple:macos:12.2
  • Apple » Macos » Version: 12.2.1
    cpe:2.3:o:apple:macos:12.2.1
  • Apple » Macos » Version: 12.3
    cpe:2.3:o:apple:macos:12.3
  • Apple » Macos » Version: 12.3.1
    cpe:2.3:o:apple:macos:12.3.1
  • Apple » Macos » Version: 12.4
    cpe:2.3:o:apple:macos:12.4
  • Apple » Macos » Version: 12.5
    cpe:2.3:o:apple:macos:12.5
  • Apple » Macos » Version: 12.5.1
    cpe:2.3:o:apple:macos:12.5.1
  • Apple » Macos » Version: 12.6
    cpe:2.3:o:apple:macos:12.6
  • Apple » Macos » Version: 12.6.1
    cpe:2.3:o:apple:macos:12.6.1
  • Apple » Macos » Version: 12.6.2
    cpe:2.3:o:apple:macos:12.6.2
  • Apple » Macos » Version: 12.6.3
    cpe:2.3:o:apple:macos:12.6.3
  • Apple » Macos » Version: 12.6.4
    cpe:2.3:o:apple:macos:12.6.4
  • Apple » Macos » Version: 12.6.5
    cpe:2.3:o:apple:macos:12.6.5
  • Apple » Macos » Version: 12.6.6
    cpe:2.3:o:apple:macos:12.6.6
  • Apple » Macos » Version: 12.6.7
    cpe:2.3:o:apple:macos:12.6.7
  • Apple » Macos » Version: 12.6.8
    cpe:2.3:o:apple:macos:12.6.8
  • Apple » Macos » Version: 12.6.9
    cpe:2.3:o:apple:macos:12.6.9
  • Apple » Macos » Version: 12.7
    cpe:2.3:o:apple:macos:12.7
  • Apple » Macos » Version: 12.7.1
    cpe:2.3:o:apple:macos:12.7.1
  • Apple » Macos » Version: 13.0
    cpe:2.3:o:apple:macos:13.0
  • Apple » Macos » Version: 13.0.0
    cpe:2.3:o:apple:macos:13.0.0
  • Apple » Macos » Version: 13.0.1
    cpe:2.3:o:apple:macos:13.0.1
  • Apple » Macos » Version: 13.1
    cpe:2.3:o:apple:macos:13.1
  • Apple » Macos » Version: 13.2
    cpe:2.3:o:apple:macos:13.2
  • Apple » Macos » Version: 13.2.1
    cpe:2.3:o:apple:macos:13.2.1
  • Apple » Macos » Version: 13.3
    cpe:2.3:o:apple:macos:13.3
  • Apple » Macos » Version: 13.3.1
    cpe:2.3:o:apple:macos:13.3.1
  • Apple » Macos » Version: 13.3.3
    cpe:2.3:o:apple:macos:13.3.3
  • Apple » Macos » Version: 13.4
    cpe:2.3:o:apple:macos:13.4
  • Apple » Macos » Version: 13.4.1
    cpe:2.3:o:apple:macos:13.4.1
  • Apple » Macos » Version: 13.5
    cpe:2.3:o:apple:macos:13.5
  • Apple » Macos » Version: 13.5.2
    cpe:2.3:o:apple:macos:13.5.2
  • Apple » Macos » Version: 13.6
    cpe:2.3:o:apple:macos:13.6
  • Apple » Macos » Version: 13.6.1
    cpe:2.3:o:apple:macos:13.6.1
  • Apple » Macos » Version: 13.6.2
    cpe:2.3:o:apple:macos:13.6.2
  • Apple » Macos » Version: 14.0
    cpe:2.3:o:apple:macos:14.0
  • Apple » Macos » Version: 14.1
    cpe:2.3:o:apple:macos:14.1
  • Apple » Macos » Version: 14.1.1
    cpe:2.3:o:apple:macos:14.1.1
  • Apple » Macos » Version: 14.1.2
    cpe:2.3:o:apple:macos:14.1.2


Contact Us

Shodan ® - All rights reserved