CVE-2023-28201
📋 TL;DR
This vulnerability allows a remote attacker to cause unexpected app termination or execute arbitrary code on affected Apple devices. It affects macOS, iOS, iPadOS, tvOS, and Safari users who haven't updated to patched versions. The issue stems from improper state management that can be exploited remotely.
💻 Affected Systems
- macOS
- Safari
- iOS
- iPadOS
- tvOS
📦 What is this software?
Ipados by Apple
Ipados by Apple
Macos by Apple
macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...
Learn more about Macos →Safari by Apple
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to full system compromise, data theft, or persistent malware installation.
Likely Case
Application crashes or denial of service, potentially leading to limited code execution in browser contexts.
If Mitigated
No impact if systems are fully patched with the latest Apple updates.
🎯 Exploit Status
CVSS 9.8 indicates critical severity with low attack complexity. Remote exploitation without authentication suggests relatively straightforward exploitation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: macOS Ventura 13.3, Safari 16.4, iOS 16.4, iPadOS 16.4, iOS 15.7.4, iPadOS 15.7.4, tvOS 16.4
Vendor Advisory: https://support.apple.com/en-us/HT213670
Restart Required: Yes
Instructions:
1. Open System Settings/Preferences. 2. Navigate to Software Update. 3. Install all available updates. 4. Restart device when prompted.
🔧 Temporary Workarounds
Disable JavaScript
allDisabling JavaScript in Safari may reduce attack surface but will break most web functionality.
Safari → Settings → Security → Uncheck 'Enable JavaScript'
Network Segmentation
allSegment affected devices from untrusted networks to limit exposure.
🧯 If You Can't Patch
- Isolate affected systems from internet access and untrusted networks
- Implement strict application allowlisting and monitor for unexpected process termination
🔍 How to Verify
Check if Vulnerable:
Check system version against affected versions list. On macOS: About This Mac → macOS version. On iOS/iPadOS: Settings → General → About → Version.
Check Version:
macOS: sw_vers -productVersion; iOS/iPadOS: Settings → General → About → Version
Verify Fix Applied:
Verify system version matches or exceeds patched versions listed in fix_official.patch_version.
📡 Detection & Monitoring
Log Indicators:
- Unexpected Safari/application crashes
- Process termination events in system logs
- Unusual network connections from browser processes
Network Indicators:
- Malicious JavaScript payloads in web traffic
- Unusual outbound connections from affected devices
SIEM Query:
source="apple_system_logs" AND (event="process_termination" OR event="application_crash") AND process_name IN ("Safari", "WebKit")
🔗 References
- https://support.apple.com/en-us/HT213670
- https://support.apple.com/en-us/HT213671
- https://support.apple.com/en-us/HT213673
- https://support.apple.com/en-us/HT213674
- https://support.apple.com/en-us/HT213676
- https://support.apple.com/en-us/HT213670
- https://support.apple.com/en-us/HT213671
- https://support.apple.com/en-us/HT213673
- https://support.apple.com/en-us/HT213674
- https://support.apple.com/en-us/HT213676