Apple has released security updates to address multiple vulnerabilities across multiple products.
The severity of the addressed vulnerabilities could allow the attacker to execute arbitrary code, gain access or gain elevated privileges on the affected systems by persuading a victim to visit a specially crafted web site.
Sample of the addressed vulnerabilities:
1. Apple macOS WebKit Code Execution (CVE-2023-32439):
2. Apple macOS Kernel Privilege Escalation (CVE-2023-32434):
Sample of the affected products:
It should be highlighted that Apple is aware of 3 zero-day vulnerabilities in Kernel and WebKit tracked as CVE-2023-324034, CVE-2023-32435, and CVE-2023-32439 which have been actively exploited in the wild.
The enterprise should deploy this patch as soon as the testing phase is completed.
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |