Loading HuntDB...

CVE-2023-41992

UNKNOWN
Published 2023-09-21T18:23:49.779Z
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2023-41992. We'll provide specific mitigation strategies based on your environment and risk profile.

CVSS Score

V3.1
7.8
/10
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Score Metrics
Exploitability: N/A Impact: N/A

EPSS Score

v2025.03.14
0.004
probability
of exploitation in the wild

There is a 0.4% chance that this vulnerability will be exploited in the wild within the next 30 days.

Updated: 2025-06-25
Exploit Probability
Percentile: 0.590
Higher than 59.0% of all CVEs

Attack Vector Metrics

Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED

Impact Metrics

Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Description

The issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.7, iOS 16.7 and iPadOS 16.7, macOS Ventura 13.6. A local attacker may be able to elevate their privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7.

Available Exploits

No exploits available for this CVE.

Related News

Jailbreak news of the week: CVE-2023-41992 PoC shared, Trigon updated, another MacDirtyCow-like bug, & more…

This roundup encompasses the latest jailbreak tweaks, jailbreak news, and iPhone hacks from Monday, May 12th to Sunday, May 18th.

Idownloadblog.com 2025-05-18 13:30
iOS Kernel Vulnerability Exposed in Public PoC – Potential Jailbreak and Privilege Escalation Risk

A newly surfaced proof of concept (PoC) has reignited attention around a critical iOS kernel vulnerability—CVE-2023-41992—that Apple patched The post iOS Kernel Vulnerability Exposed in Public PoC – Potential Jailbreak and Privilege Escalation Risk appeared first on Daily CyberSecurity.

SecurityOnline.info 2025-05-16 02:15
Security researcher shares PoC for CVE-2023-41992 local privilege escalation bug

Security researcher @karzan_0x455 has shared a proof of concept for CVE-2023-41992.

Idownloadblog.com 2025-05-15 03:06

Affected Products

Known Exploited Vulnerability

This vulnerability is actively being exploited in the wild

View KEV Details

Remediation Status

Overdue

Due Date

October 16, 2023

Added to KEV

September 25, 2023

Required Action

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Affected Product

Vendor/Project: Apple
Product: Multiple Products

Ransomware Risk

Known Ransomware Use
KEV Catalog Version: 2025.01.24 Released: January 24, 2025

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

⚠ Unreviewed HIGH

GHSA-wcch-rmxq-7x86

Advisory Details

The issue was addressed with improved checks. This issue is fixed in iOS 16.7 and iPadOS 16.7, OS 17.0.1 and iPadOS 17.0.1, watchOS 9.6.3, macOS Ventura 13.6, macOS Monterey 12.7, watchOS 10.0.1. A local attacker may be able to elevate their privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7.

CVSS Scoring

CVSS Score

7.5

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Advisory provided by GitHub Security Advisory Database. Published: September 21, 2023, Modified: January 11, 2024

References

Published: 2023-09-21T18:23:49.779Z
Last Modified: 2025-02-04T16:33:59.523Z
Copied to clipboard!