Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-42873: An app may be able to execute arbitrary code with kernel privileges in Apple iOS and iPadOS

0
High
VulnerabilityCVE-2023-42873cvecve-2023-42873
Published: Wed Feb 21 2024 (02/21/2024, 06:41:59 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

The issue was addressed with improved bounds checks. This issue is fixed in macOS Sonoma 14.1, tvOS 17.1, macOS Monterey 12.7.1, iOS 16.7.2 and iPadOS 16.7.2, iOS 17.1 and iPadOS 17.1, macOS Ventura 13.6.1. An app may be able to execute arbitrary code with kernel privileges.

AI-Powered Analysis

AILast updated: 11/04/2025, 20:19:17 UTC

Technical Analysis

CVE-2023-42873 is a vulnerability identified in Apple iOS, iPadOS, and macOS operating systems that allows a local application to execute arbitrary code with kernel privileges. The root cause is an out-of-bounds write (CWE-787) due to insufficient bounds checking in the kernel code. This flaw enables an attacker with limited privileges on the device to escalate their privileges to kernel level, effectively gaining full control over the system. The vulnerability does not require user interaction but does require that the attacker has the ability to run a local app, which could be achieved through malicious app installation or exploitation of other vulnerabilities. Apple addressed this issue by improving bounds checks in the kernel and released patches across multiple OS versions: iOS 16.7.2, iOS 17.1, iPadOS 16.7.2, iPadOS 17.1, macOS Sonoma 14.1, macOS Monterey 12.7.1, and macOS Ventura 13.6.1. The CVSS v3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack vector complexity but requiring local privileges. No public exploits are known at this time, but the vulnerability’s nature makes it a critical risk if exploited, as it could allow attackers to bypass security controls, install persistent malware, or steal sensitive data. The vulnerability affects a broad range of Apple devices, including iPhones, iPads, and Macs, making it relevant for both consumer and enterprise environments.

Potential Impact

For European organizations, the impact of CVE-2023-42873 is significant due to the widespread use of Apple devices in business and government sectors. Successful exploitation could lead to complete system compromise, allowing attackers to access sensitive corporate data, intellectual property, or personal information protected under GDPR. The ability to execute code with kernel privileges means attackers could disable security mechanisms, install persistent backdoors, or manipulate system operations undetected. This poses a direct threat to confidentiality, integrity, and availability of critical systems. Sectors such as finance, healthcare, government, and telecommunications, which rely heavily on Apple devices for secure communications and operations, are particularly vulnerable. Additionally, the vulnerability could be leveraged in targeted attacks or espionage campaigns against high-value European targets. The absence of known exploits currently provides a window for mitigation, but the risk remains high given the potential impact and ease of local exploitation once a malicious app is present.

Mitigation Recommendations

European organizations should prioritize immediate patching of all affected Apple devices by deploying the updates iOS 16.7.2, iOS 17.1, iPadOS 16.7.2, iPadOS 17.1, macOS Sonoma 14.1, macOS Monterey 12.7.1, and macOS Ventura 13.6.1. Restricting app installations to trusted sources such as the Apple App Store and enforcing strict mobile device management (MDM) policies can reduce the risk of malicious app deployment. Implementing application whitelisting and monitoring for unusual kernel-level activity can help detect exploitation attempts. Organizations should also educate users about the risks of installing untrusted applications and enforce least privilege principles to limit local user permissions. Regularly auditing device compliance and using endpoint detection and response (EDR) tools tailored for Apple platforms will enhance visibility into potential exploitation. For high-risk environments, consider isolating critical Apple devices from less secure networks and applying network segmentation to limit lateral movement in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2023-09-14T19:05:11.453Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a554ea730e5a3d9d782b1

Added to database: 11/4/2025, 7:34:38 PM

Last enriched: 11/4/2025, 8:19:17 PM

Last updated: 11/5/2025, 3:59:41 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats