Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-35984: An attacker in physical proximity can cause a limited out of bounds write in Apple iOS and iPadOS

0
Unknown
VulnerabilityCVE-2023-35984cvecve-2023-35984
Published: Tue Sep 26 2023 (09/26/2023, 20:14:40 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

The issue was addressed with improved checks. This issue is fixed in tvOS 17, iOS 17 and iPadOS 17, watchOS 10, macOS Sonoma 14. An attacker in physical proximity can cause a limited out of bounds write.

AI-Powered Analysis

AILast updated: 11/04/2025, 19:39:49 UTC

Technical Analysis

CVE-2023-35984 is a vulnerability discovered in Apple’s iOS and iPadOS platforms, as well as related operating systems like tvOS, watchOS, and macOS Sonoma. The vulnerability involves a limited out-of-bounds write condition that can be triggered by an attacker who is physically near the target device. This type of memory corruption flaw can potentially lead to unexpected behavior, including crashes or, in some cases, exploitation for privilege escalation or arbitrary code execution. However, the write is described as limited, which suggests constraints on the extent of memory corruption possible. Apple addressed this issue by implementing improved input validation and boundary checks in the affected operating systems, releasing fixes in versions iOS 17, iPadOS 17, tvOS 17, watchOS 10, and macOS Sonoma 14. The vulnerability does not have a CVSS score assigned yet, and there are no known exploits in the wild, indicating it may be difficult to exploit or not widely targeted currently. The requirement for physical proximity means that remote exploitation is not feasible, reducing the attack surface primarily to scenarios where an attacker can be near the device, such as in public spaces, offices, or during device handoffs. The vulnerability affects all unspecified versions prior to the patched releases, implying a broad impact across Apple device users who have not updated. Given Apple’s significant market share in Europe, especially in consumer and enterprise sectors, this vulnerability is relevant for organizations relying on Apple hardware and software. The risk is heightened in environments where devices are shared, left unattended, or physically accessible to untrusted individuals.

Potential Impact

For European organizations, the impact of CVE-2023-35984 centers on the potential for attackers with physical access to cause memory corruption on Apple devices, which could lead to device instability, denial of service, or potentially privilege escalation if chained with other vulnerabilities. This could compromise the confidentiality and integrity of sensitive data stored or accessed on these devices. Sectors such as finance, government, healthcare, and critical infrastructure that use Apple devices extensively could face operational disruptions or data breaches if attackers exploit this vulnerability. The physical proximity requirement limits the threat to environments where device security is lax or where devices are frequently exposed to untrusted individuals, such as in public-facing roles or shared workspaces. The absence of known exploits reduces immediate risk but does not eliminate the possibility of future exploitation. Failure to patch could allow attackers to leverage this vulnerability as part of a multi-stage attack, especially in targeted espionage or insider threat scenarios. The impact on availability is moderate, as out-of-bounds writes can cause crashes or erratic behavior. Confidentiality and integrity impacts depend on the attacker’s ability to escalate privileges or execute arbitrary code, which is uncertain but plausible given the nature of memory corruption bugs.

Mitigation Recommendations

1. Immediate deployment of the latest Apple OS updates (iOS 17, iPadOS 17, tvOS 17, watchOS 10, macOS Sonoma 14) across all organizational Apple devices to ensure the vulnerability is patched. 2. Enforce strict physical security policies to limit unauthorized physical access to devices, including secure storage, controlled access areas, and monitoring in public or shared environments. 3. Implement device management solutions (MDM) to enforce update compliance and remotely monitor device health and security posture. 4. Educate employees about the risks of leaving devices unattended and the importance of physical security hygiene. 5. Use strong authentication methods (biometrics, strong passcodes) to reduce the risk of unauthorized use even if physical access is gained. 6. Monitor for unusual device behavior or crashes that could indicate exploitation attempts. 7. Consider network segmentation and data encryption to limit the impact if a device is compromised. 8. Maintain an incident response plan that includes procedures for handling suspected physical tampering or exploitation of device vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2023-07-20T15:03:50.127Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690a53252a90255b94da66e1

Added to database: 11/4/2025, 7:25:25 PM

Last enriched: 11/4/2025, 7:39:49 PM

Last updated: 11/6/2025, 2:15:56 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats