CVE-2023-42962

7.5 HIGH

📋 TL;DR

This vulnerability allows a remote attacker to cause denial-of-service conditions on affected Apple devices. The issue affects iOS and iPadOS devices running vulnerable versions, potentially disrupting device functionality or availability.

💻 Affected Systems

Products:
  • iPhone
  • iPad
Versions: iOS and iPadOS versions before 17.2 and before 16.7.3
Operating Systems: iOS, iPadOS
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running affected iOS/iPadOS versions are vulnerable by default

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device unavailability or persistent service disruption requiring device restart or recovery

🟠

Likely Case

Temporary service interruption or degraded performance until system recovers

🟢

If Mitigated

Minimal impact with proper network segmentation and updated devices

🌐 Internet-Facing: MEDIUM - Remote exploitation possible but requires specific conditions
🏢 Internal Only: LOW - Primarily affects mobile devices, not typical internal infrastructure

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Remote exploitation possible but specific attack vectors not publicly documented

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: iOS 17.2, iPadOS 17.2, iOS 16.7.3, iPadOS 16.7.3

Vendor Advisory: https://support.apple.com/en-us/HT214034

Restart Required: Yes

Instructions:

1. Open Settings app. 2. Tap General. 3. Tap Software Update. 4. Download and install available update. 5. Restart device when prompted.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to iOS/iPadOS devices from untrusted networks

Disable Unnecessary Services

all

Turn off unused network services and features on affected devices

🧯 If You Can't Patch

  • Isolate affected devices on separate network segments
  • Implement strict network access controls and monitoring

🔍 How to Verify

Check if Vulnerable:

Check iOS/iPadOS version in Settings > General > About > Software Version

Check Version:

Not applicable - check via device Settings interface

Verify Fix Applied:

Verify version is 17.2 or later, or 16.7.3 or later for older devices

📡 Detection & Monitoring

Log Indicators:

  • Unexpected device restarts
  • Service interruption logs
  • Crash reports

Network Indicators:

  • Unusual network traffic patterns to iOS devices
  • Connection spikes followed by disconnections

SIEM Query:

Not applicable - primarily affects mobile endpoints not typically monitored by enterprise SIEM

🔗 References

📤 Share & Export