Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-28204: Processing web content may disclose sensitive information. Apple is aware of a report that this issue may have been actively exploited. in Apple macOS

0
Medium
VulnerabilityCVE-2023-28204cvecve-2023-28204
Published: Fri Jun 23 2023 (06/23/2023, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: macOS

Description

An out-of-bounds read was addressed with improved input validation. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.6 and iPadOS 15.7.6, Safari 16.5, iOS 16.5 and iPadOS 16.5. Processing web content may disclose sensitive information. Apple is aware of a report that this issue may have been actively exploited.

AI-Powered Analysis

AILast updated: 10/28/2025, 23:01:25 UTC

Technical Analysis

CVE-2023-28204 is an out-of-bounds read vulnerability classified under CWE-125, affecting Apple’s macOS and other operating systems including watchOS, tvOS, iOS, and iPadOS, as well as Safari browser. The vulnerability stems from improper input validation when processing web content, which can cause the system to read memory outside the intended buffer boundaries. This memory disclosure can leak sensitive information to an attacker. The vulnerability is exploitable remotely over the network (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R), such as visiting a malicious website or opening crafted web content. The scope is unchanged (S:U), and the impact is high on confidentiality (C:H) but none on integrity or availability (I:N/A:N). Apple has released patches in multiple OS versions including macOS Ventura 13.4 and Safari 16.5 to address this issue by improving input validation and bounds checking. Although no confirmed exploits in the wild have been publicly documented, Apple is aware of reports indicating potential active exploitation attempts. The vulnerability allows attackers to potentially extract sensitive data from memory, which could include user credentials, personal information, or other confidential data processed by the browser or OS components handling web content.

Potential Impact

For European organizations, this vulnerability poses a risk of sensitive data leakage through web browsers or other applications processing web content on Apple devices. Given the widespread use of Apple products in business and government sectors across Europe, unauthorized disclosure of confidential information could lead to privacy violations, intellectual property theft, and compliance issues under regulations such as GDPR. The vulnerability does not allow code execution or system compromise but can be leveraged to gather intelligence or facilitate further attacks. Organizations relying on macOS, iOS, or Safari for critical operations may face increased risk if users access untrusted web content. The impact is particularly significant for sectors handling sensitive personal or financial data, including finance, healthcare, and public administration. The requirement for user interaction means social engineering or phishing campaigns could be used to trigger exploitation.

Mitigation Recommendations

European organizations should prioritize deploying the security updates released by Apple for macOS Ventura 13.4, iOS 15.7.6, iPadOS 15.7.6, watchOS 9.5, tvOS 16.5, and Safari 16.5 to remediate this vulnerability. Beyond patching, organizations should implement strict web content filtering and employ endpoint protection solutions capable of detecting anomalous memory access patterns. User awareness training should emphasize the risks of interacting with suspicious websites or links. Network-level protections such as DNS filtering and web proxy solutions can reduce exposure to malicious web content. Monitoring for unusual browser behavior or memory access anomalies can help detect exploitation attempts. For high-security environments, consider restricting or sandboxing web browsing activities on Apple devices. Regular vulnerability scanning and compliance checks should verify patch status. Incident response plans should include procedures for potential data leakage incidents stemming from this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
apple
Date Reserved
2023-03-13T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9a7247d717aace218ee

Added to database: 10/21/2025, 7:06:15 PM

Last enriched: 10/28/2025, 11:01:25 PM

Last updated: 10/30/2025, 3:37:32 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats