CVE-2023-42848

7.8 HIGH

📋 TL;DR

This vulnerability allows an attacker to cause heap corruption by tricking a user into processing a maliciously crafted image. It affects Apple devices running vulnerable versions of iOS, iPadOS, macOS, tvOS, and watchOS. Successful exploitation could lead to arbitrary code execution.

💻 Affected Systems

Products:
  • iOS
  • iPadOS
  • macOS
  • tvOS
  • watchOS
Versions: Versions prior to iOS 16.7.2, iPadOS 16.7.2, iOS 17.1, iPadOS 17.1, macOS Ventura 13.6.1, macOS Sonoma 14.1, tvOS 17.1, watchOS 10.1
Operating Systems: Apple iOS, Apple iPadOS, Apple macOS, Apple tvOS, Apple watchOS
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running affected versions are vulnerable when processing images through built-in image handling components.

📦 What is this software?

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with the privileges of the user processing the image, potentially leading to full system compromise.

🟠

Likely Case

Application crash or denial of service when processing malicious images, with potential for code execution in targeted attacks.

🟢

If Mitigated

No impact if systems are patched or if malicious images are blocked from reaching vulnerable systems.

🌐 Internet-Facing: MEDIUM - Exploitation requires user interaction (processing an image), but malicious images could be delivered via web, email, or messaging.
🏢 Internal Only: LOW - Internal users would need to process malicious images, which is less likely in controlled environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to process a malicious image. No public exploit code is known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: watchOS 10.1, macOS Sonoma 14.1, tvOS 17.1, iOS 16.7.2, iPadOS 16.7.2, iOS 17.1, iPadOS 17.1, macOS Ventura 13.6.1

Vendor Advisory: https://support.apple.com/en-us/HT213981

Restart Required: Yes

Instructions:

1. Go to Settings > General > Software Update on iOS/iPadOS/watchOS/tvOS. 2. Install the latest available update. 3. For macOS, go to System Settings > General > Software Update. 4. Install the latest available update. 5. Restart the device after installation.

🔧 Temporary Workarounds

Block untrusted image sources

all

Prevent processing of images from untrusted sources such as unknown websites, emails, or messages.

🧯 If You Can't Patch

  • Implement network filtering to block malicious image files at the perimeter.
  • Educate users to avoid opening images from untrusted sources and to use updated applications for image processing.

🔍 How to Verify

Check if Vulnerable:

Check the device's operating system version against the affected versions listed above.

Check Version:

iOS/iPadOS: Settings > General > About > Version. macOS: Apple menu > About This Mac > macOS version. tvOS: Settings > General > About > Version. watchOS: Watch app on iPhone > General > About > Version.

Verify Fix Applied:

Verify that the device is running one of the patched versions: iOS 16.7.2+, iPadOS 16.7.2+, iOS 17.1+, iPadOS 17.1+, macOS Ventura 13.6.1+, macOS Sonoma 14.1+, tvOS 17.1+, watchOS 10.1+.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes related to image processing libraries
  • Unexpected memory access violations in system logs

Network Indicators:

  • Unusual image file downloads from untrusted sources
  • Spike in image processing requests

SIEM Query:

Search for events where image processing applications crash unexpectedly or show memory corruption errors.

🔗 References

📤 Share & Export