CVE-2023-28205
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
10/04/2023
Last modified:
23/10/2025
Description
A use after free issue was addressed with improved memory management. This issue is fixed in Safari 16.4.1, iOS 15.7.5 and iPadOS 15.7.5, iOS 16.4.1 and iPadOS 16.4.1, macOS Ventura 13.3.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* | 16.4.1 (excluding) | |
| cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* | 15.7.5 (excluding) | |
| cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* | 16.0 (including) | 16.4.1 (excluding) |
| cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* | 15.7.5 (excluding) | |
| cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* | 16.0 (including) | 16.4.1 (excluding) |
| cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* | 13.3.1 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://support.apple.com/en-us/HT213720
- https://support.apple.com/en-us/HT213721
- https://support.apple.com/en-us/HT213722
- https://support.apple.com/en-us/HT213723
- https://support.apple.com/en-us/HT213720
- https://support.apple.com/en-us/HT213721
- https://support.apple.com/en-us/HT213722
- https://support.apple.com/en-us/HT213723
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-28205



