CVE-2023-41990

7.8 HIGH

📋 TL;DR

This vulnerability allows arbitrary code execution by processing a malicious font file on Apple devices. It affects iOS, iPadOS, tvOS, watchOS, and macOS systems running vulnerable versions. Apple has confirmed active exploitation against pre-iOS 15.7.1 versions.

💻 Affected Systems

Products:
  • iPhone
  • iPad
  • Mac
  • Apple TV
  • Apple Watch
Versions: Versions before tvOS 16.3, iOS 16.3, iPadOS 16.3, macOS Monterey 12.6.8, macOS Big Sur 11.7.9, iOS 15.7.8, iPadOS 15.7.8, macOS Ventura 13.2, watchOS 9.3
Operating Systems: iOS, iPadOS, macOS, tvOS, watchOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. Apple confirmed active exploitation against versions before iOS 15.7.1.

📦 What is this software?

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attacker to execute arbitrary code with user privileges, potentially leading to data theft, surveillance, or ransomware deployment.

🟠

Likely Case

Targeted attacks against specific users to install spyware or gain persistent access to devices.

🟢

If Mitigated

No impact if devices are fully patched or font processing is restricted.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Apple confirmed active exploitation in the wild. Exploitation requires user interaction to process malicious font file.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: tvOS 16.3, iOS 16.3, iPadOS 16.3, macOS Monterey 12.6.8, macOS Big Sur 11.7.9, iOS 15.7.8, iPadOS 15.7.8, macOS Ventura 13.2, watchOS 9.3

Vendor Advisory: https://support.apple.com/en-us/HT213599

Restart Required: Yes

Instructions:

1. Go to Settings > General > Software Update on iOS/iPadOS/tvOS/watchOS. 2. Install available updates. 3. For macOS: Apple menu > System Settings > General > Software Update. 4. Restart device after installation.

🔧 Temporary Workarounds

Restrict font installation

all

Prevent installation of untrusted fonts through MDM or configuration profiles

Web content filtering

all

Block font file downloads from untrusted websites

🧯 If You Can't Patch

  • Isolate vulnerable devices from internet and untrusted networks
  • Implement application allowlisting to prevent execution of suspicious processes

🔍 How to Verify

Check if Vulnerable:

Check device version against affected versions list. On iOS/iPadOS: Settings > General > About > Version. On macOS: Apple menu > About This Mac.

Check Version:

iOS/iPadOS/tvOS/watchOS: Settings > General > About > Version. macOS: sw_vers or Apple menu > About This Mac

Verify Fix Applied:

Verify device version matches or exceeds patched versions listed in fix_official section.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected font file processing
  • Crash reports from font-related processes
  • Unusual process execution following font handling

Network Indicators:

  • Downloads of font files from suspicious sources
  • Unusual outbound connections after font processing

SIEM Query:

process_name:fontd AND (parent_process:unexpected OR cmdline:contains:malicious_font)

🔗 References

📤 Share & Export