Apple Multiple Products Code Execution Vulnerability (CVE-2023-41990)
Apple iOS, iPadOS, macOS, tvOS, and watchOS contain an unspecified vulnerability that allows for code execution when processing a font file.
A local attacker, without authentication, can achieve full data confidentiality loss, arbitrary modification of data, complete denial of service or system unavailability. Federal agencies are required to remediate by 2024-01-29 under CISA BOD 22-01.
This vulnerability affects Apple Multiple Products. The issue was addressed with improved handling of caches. This issue is fixed in tvOS 16.3, iOS 16.3 and iPadOS 16.3, macOS Monterey 12.6.8, macOS Big Sur 11.7.9, iOS 15.7.8 and iPadOS 15.7.8, macOS Ventura 13.2, watchOS 9.3. Processing a font file may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.1. Exploitation requires local access, low attack complexity, no authentication required, and user interaction required.
Probably yes if any of these apply:
CISA added this CVE to the Known Exploited Vulnerabilities catalog on 2024-01-08 based on evidence of active exploitation in the wild. Federal agencies required to remediate by 2024-01-29.
Manual remediation steps
No tested PowerShell script for this entry yet. We’re prioritising automation based on user demand.