Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-42951: A user may be unable to delete browsing history items in Apple iOS and iPadOS

0
Medium
VulnerabilityCVE-2023-42951cvecve-2023-42951
Published: Wed Feb 21 2024 (02/21/2024, 06:41:30 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

The issue was addressed with improved handling of caches. This issue is fixed in iOS 17.1 and iPadOS 17.1. A user may be unable to delete browsing history items.

AI-Powered Analysis

AILast updated: 11/04/2025, 20:06:41 UTC

Technical Analysis

CVE-2023-42951 is a vulnerability identified in Apple’s iOS and iPadOS operating systems that affects the ability of users to delete browsing history items. The root cause lies in improper handling of caches related to browsing history, which prevents the deletion operation from completing successfully. This issue compromises the integrity of user data management by retaining browsing history items that users intend to remove, potentially exposing sensitive browsing information if devices are shared or inspected. The vulnerability does not allow unauthorized access or modification of data beyond this scope, nor does it affect system availability or confidentiality directly. The CVSS 3.1 base score of 4.3 reflects a medium severity, with an attack vector over the network, low attack complexity, requiring privileges but no user interaction, and limited impact on integrity only. Apple addressed this issue in iOS and iPadOS version 17.1 by improving cache handling mechanisms to ensure browsing history deletions are properly processed. There are no known exploits in the wild, indicating limited active threat. However, the inability to delete browsing history can have privacy implications, especially in environments where device sharing or forensic analysis occurs. This vulnerability is relevant for organizations and individuals relying on Apple mobile devices for secure and private browsing experiences.

Potential Impact

For European organizations, the primary impact of CVE-2023-42951 is related to user privacy and compliance with data protection regulations such as the GDPR. If users cannot delete browsing history, sensitive information may persist on devices longer than intended, increasing the risk of unauthorized disclosure during device sharing, loss, or inspection. This can undermine trust in organizational device management policies and potentially lead to non-compliance with privacy mandates. Although the vulnerability does not allow external attackers to compromise systems or data directly, it weakens user control over personal data, which is critical in privacy-conscious environments. Organizations that issue Apple devices to employees or manage mobile device fleets should be aware of this limitation and ensure timely updates to mitigate privacy risks. The impact on operational security is limited, but the reputational and regulatory risks related to privacy could be significant if not addressed.

Mitigation Recommendations

To mitigate CVE-2023-42951, organizations should prioritize updating all affected Apple devices to iOS and iPadOS version 17.1 or later, where the issue is resolved. Device management policies should enforce timely patch deployment and verify update compliance across mobile fleets. Additionally, organizations can implement mobile device management (MDM) solutions to monitor device versions and enforce security baselines. User training should emphasize the importance of applying updates and understanding privacy settings related to browsing history. For environments where device sharing is common, consider additional controls such as user profiles or secure browsing modes that limit history retention. Regular audits of device configurations and privacy settings can help detect residual risks. Finally, organizations should review their privacy policies and incident response plans to address potential data exposure scenarios arising from this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2023-09-14T19:05:11.475Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a5554a730e5a3d9d7a300

Added to database: 11/4/2025, 7:34:44 PM

Last enriched: 11/4/2025, 8:06:41 PM

Last updated: 12/20/2025, 2:13:59 PM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats