7.8
CVSSv3

CVE-2023-23536

Published: 08/05/2023 Updated: 27/07/2023
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 0

Vulnerability Summary

The issue was addressed with improved bounds checks. This issue is fixed in macOS Ventura 13.3, iOS 16.4 and iPadOS 16.4, macOS Big Sur 11.7.5, iOS 15.7.4 and iPadOS 15.7.4, macOS Monterey 12.6.4, tvOS 16.4, watchOS 9.4. An app may be able to execute arbitrary code with kernel privileges.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apple macos

apple iphone os

apple ipados

Github Repositories

kfd, short for kernel file descriptor, is a project to read and write kernel memory on Apple devices.

Quick disclaimer: I have no intention of adding offsets for other devices and iOS versions kfd kfd, short for kernel file descriptor, is a project to read and write kernel memory on Apple devices It leverages various vulnerabilities that can be exploited to obtain dangling PTEs, which will be referred to as a PUAF primitive, short for "physical use-after-free" The

kfd kfd, short for kernel file descriptor, is a project to read and write kernel memory on Apple devices It leverages various vulnerabilities that can be exploited to obtain dangling PTEs, which will be referred to as a PUAF primitive, short for "physical use-after-free" Then, it reallocates certain kernel objects inside those physical pages and manipulates them dir

fork for testing

kfd kfd, short for kernel file descriptor, is a project to read and write kernel memory on Apple devices It leverages various vulnerabilities that can be exploited to obtain dangling PTEs, which will be referred to as a PUAF primitive, short for "physical use-after-free" Then, it reallocates certain kernel objects inside those physical pages and manipulates them dir

kfd kfd, short for kernel file descriptor, is a project to read and write kernel memory on Apple devices It leverages various vulnerabilities that can be exploited to obtain dangling PTEs, which will be referred to as a PUAF primitive, short for "physical use-after-free" Then, it reallocates certain kernel objects inside those physical pages and manipulates them dir

kfund (Post-Exploitation) kfund, short for my fun with kfd exploit Supported Device iPhone 14 Pro/Pro Max on iOS 1612 (Currently only working with smith exploit) What you can do with this? utilsm int ResSet16(NSInteger height, NSInteger width); Change resolution via modify comappleiokitIOMobileGraphicsFamilyplist It's safe t

Quick disclaimer: I have no intention of adding offsets for other devices and iOS versions kfd kfd, short for kernel file descriptor, is a project to read and write kernel memory on Apple devices It leverages various vulnerabilities that can be exploited to obtain dangling PTEs, which will be referred to as a PUAF primitive, short for "physical use-after-free" The

Quick disclaimer: I have no intention of adding offsets for other devices and iOS versions kfd kfd, short for kernel file descriptor, is a project to read and write kernel memory on Apple devices It leverages various vulnerabilities that can be exploited to obtain dangling PTEs, which will be referred to as a PUAF primitive, short for "physical use-after-free" The