SB2023032764 - Multiple vulnerabilities in Apple watchOS



SB2023032764 - Multiple vulnerabilities in Apple watchOS

Published: March 27, 2023 Updated: December 26, 2023

Security Bulletin ID SB2023032764
Severity
Medium
Patch available
YES
Number of vulnerabilities 24
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 25% Low 75%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 24 secuirty vulnerabilities.


1) Use-after-free (CVE-ID: CVE-2023-27969)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the OS kernel. A local application can trigger a use-after-free error and execute arbitrary code with kernel privileges.


2) Information disclosure (CVE-ID: CVE-2023-27954)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application. A remote attacker can track sensitive user information.


3) Security features bypass (CVE-ID: CVE-2023-27932)

The vulnerability allows a remote attacker to bypass Same Origin Policy restrictions.

The vulnerability exists due to improper state management. A remote attacker can trick the victim to visit a specially crafted website and bypass Same Origin Policy restrictions.


4) Improper access control (CVE-ID: CVE-2023-27931)

The vulnerability allows a local application to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions in AppleMobileFileIntegrity. A local application can gain access to user-sensitive data.


5) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2023-27963)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to improper permissions checks in Shortcuts. A shortcut may be able to use sensitive data with certain actions without prompting the user.


6) Improper access control (CVE-ID: CVE-2023-27942)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper access restrictions in Podcasts. A local application can gain access to user-sensitive data.


7) Memory corruption (CVE-ID: CVE-2023-27933)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error within the OS kernel. A local privileged application (with root permissions) can trigger memory corruption and execute arbitrary code with kernel privileges.


8) Out-of-bounds read (CVE-ID: CVE-2023-27929)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in ImageIO. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger an out-of-bounds read error and read contents of memory on the system.


9) Improper access control (CVE-ID: CVE-2023-23527)

The vulnerability allows a local application to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions in AppleMobileFileIntegrity. A local application can gain access to protected parts of the file system.


10) Out-of-bounds read (CVE-ID: CVE-2023-23535)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in ImageIO. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger an out-of-bounds read error and read contents of memory on the system.


11) Inclusion of Sensitive Information in Log Files (CVE-ID: CVE-2023-27928)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to Identity Services stores sensitive information into log files. A local application can read the log files and gain read information about a user’s contacts.


12) Integer overflow (CVE-ID: CVE-2023-27937)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow in Foundation when handling plist files. A remote attacker can trick the victim to download a malicious app, trigger an integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


13) Out-of-bounds read (CVE-ID: CVE-2023-27956)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in FontParser. A remote attacker can create a specially crafted image file, trick the victim into opening it, trigger an out-of-bounds read error and read contents of memory on the system.


14) Inclusion of Sensitive Information in Log Files (CVE-ID: CVE-2023-23537)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to Find My feature stores sensitive location information into log files. A local application can read the log files and gain access to sensitive location data.


15) Buffer overflow (CVE-ID: CVE-2023-28181)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error in CoreCapture. A local application can trigger memory corruption and execute arbitrary code with kernel privileges.


16) Input validation error (CVE-ID: CVE-2023-27961)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to insufficient validation of user-supplied input in the Calendar application when processing calendar invitation. A remote attacker can exfiltrate user information.


17) Buffer overflow (CVE-ID: CVE-2023-23536)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error when the OS kernel. A local application can trigger memory corruption and execute arbitrary code with elevated privileges.


18) Observable discrepancy (CVE-ID: CVE-2023-23543)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists in the Camera app. A local sandboxed application can determine which app is currently using the camera.


19) Security features bypass (CVE-ID: CVE-2023-28178)

The vulnerability allows a local application to bypass implemented security restrictions.

The vulnerability exists due to improper input validation in Sandbox component. A local application can bypass Privacy preferences.


20) Inclusion of Sensitive Information in Log Files (CVE-ID: CVE-2023-28195)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to the Find My feature stores sensitive information into log files. A local application can read sensitive location information.


21) Out-of-bounds read (CVE-ID: CVE-2023-42862)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in ImageIO. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger an out-of-bounds read error and read contents of memory on the system.


22) Out-of-bounds read (CVE-ID: CVE-2023-42865)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in ImageIO. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger an out-of-bounds read error and read contents of memory on the system.


23) Integer overflow (CVE-ID: CVE-2023-28185)

The vulnerability allows a local application to perform a denial of service (DoS) attack.

The vulnerability exists due to integer overflow within the OS kernel. A local application can trigger an integer overflow and crash the kernel.


24) Buffer overflow (CVE-ID: CVE-2023-32424)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error within the OS kernel. A local application can trigger memory corruption and execute arbitrary code with elevated privileges.


Remediation

Install update from vendor's website.