CVE-2023-28201

9.8 CRITICAL

📋 TL;DR

This vulnerability allows a remote attacker to cause unexpected app termination or execute arbitrary code on affected Apple devices. It affects macOS, iOS, iPadOS, tvOS, and Safari users who haven't updated to patched versions. The issue stems from improper state management that can be exploited remotely.

💻 Affected Systems

Products:
  • macOS
  • Safari
  • iOS
  • iPadOS
  • tvOS
Versions: Versions prior to macOS Ventura 13.3, Safari 16.4, iOS 16.4, iPadOS 16.4, iOS 15.7.4, iPadOS 15.7.4, tvOS 16.4
Operating Systems: macOS, iOS, iPadOS, tvOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected versions are vulnerable. No special configuration required for exploitation.

📦 What is this software?

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to full system compromise, data theft, or persistent malware installation.

🟠

Likely Case

Application crashes or denial of service, potentially leading to limited code execution in browser contexts.

🟢

If Mitigated

No impact if systems are fully patched with the latest Apple updates.

🌐 Internet-Facing: HIGH - Remote exploitation without authentication makes internet-facing devices particularly vulnerable.
🏢 Internal Only: MEDIUM - Internal devices could still be exploited through malicious internal traffic or compromised internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CVSS 9.8 indicates critical severity with low attack complexity. Remote exploitation without authentication suggests relatively straightforward exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: macOS Ventura 13.3, Safari 16.4, iOS 16.4, iPadOS 16.4, iOS 15.7.4, iPadOS 15.7.4, tvOS 16.4

Vendor Advisory: https://support.apple.com/en-us/HT213670

Restart Required: Yes

Instructions:

1. Open System Settings/Preferences. 2. Navigate to Software Update. 3. Install all available updates. 4. Restart device when prompted.

🔧 Temporary Workarounds

Disable JavaScript

all

Disabling JavaScript in Safari may reduce attack surface but will break most web functionality.

Safari → Settings → Security → Uncheck 'Enable JavaScript'

Network Segmentation

all

Segment affected devices from untrusted networks to limit exposure.

🧯 If You Can't Patch

  • Isolate affected systems from internet access and untrusted networks
  • Implement strict application allowlisting and monitor for unexpected process termination

🔍 How to Verify

Check if Vulnerable:

Check system version against affected versions list. On macOS: About This Mac → macOS version. On iOS/iPadOS: Settings → General → About → Version.

Check Version:

macOS: sw_vers -productVersion; iOS/iPadOS: Settings → General → About → Version

Verify Fix Applied:

Verify system version matches or exceeds patched versions listed in fix_official.patch_version.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected Safari/application crashes
  • Process termination events in system logs
  • Unusual network connections from browser processes

Network Indicators:

  • Malicious JavaScript payloads in web traffic
  • Unusual outbound connections from affected devices

SIEM Query:

source="apple_system_logs" AND (event="process_termination" OR event="application_crash") AND process_name IN ("Safari", "WebKit")

🔗 References

📤 Share & Export