This page was not yet optimized for use on mobile devices.
CVE-2023-38592
Data ?
Vulnerability ID | CVE-2023-38592 |
---|---|
Published on | 28.07.2023 05:15 |
Severity | HIGH |
Vulnerable configurations ?
- cpe:2.3:o:apple:ipados:16.0:*:*:*:*:*:*:*, cpe:2.3:o:apple:ipados:16.1:*:*:*:*:*:*:*, cpe:2.3:o:apple:ipados:16.1.1:*:*:*:*:*:*:*, cpe:2.3:o:apple:ipados:16.1.2:*:*:*:*:*:*:*, cpe:2.3:o:apple:ipados:16.2:*:*:*:*:*:*:*, cpe:2.3:o:apple:ipados:16.3:*:*:*:*:*:*:*, cpe:2.3:o:apple:ipados:16.3.1:*:*:*:*:*:*:*, cpe:2.3:o:apple:ipados:16.4:*:*:*:*:*:*:*, cpe:2.3:o:apple:ipados:16.4.1:*:*:*:*:*:*:*, cpe:2.3:o:apple:ipados:16.5:*:*:*:*:*:*:*
-
…
Vulnerable certificates ?
The CVE was matched to the following certificates. This means the vulnerability likely affects said certified devices. However, this is an automated process that may have false positives and negatives.
Common Criteria certificates Display network
- Strong customer authentication pour Apple Pay sur Apple Watch série 4 exécutant watchOS 7.4.1 (Version 18T201)
- Apple macOS 13 Ventura
- Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 16.4.1iOS 16.4.1 (build 20E252) (ANSSI-CC-2023/58)
- Strong Customer Authentication pour Apple Pay sur Apple Watch avec S7 exécutant watchOS 8.5.1 (Version 8.5.1 (build 19T252))
- Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4(watchOS 9.4 (build 20T253)) ( ANSSI-CC-2023/60)
- Apple macOS 13 Ventura: FileVault
- Strong Customer Authentication for Apple Pay, on MacBook Air 2022 with M2 running macOS Ventura 13.3.1
- Strong Customer Authentication for Apple Pay on iPhone 14 Pro with A16 Bionic running iOS 16.4.1Version iOS 16.4.1 (build 20E252) ( ANSSI-CC-2023/59)
- Strong Customer Authentication for Apple Pay on Mac mini with M2 and Magic keyboard with Touch ID, running macOS Ventura 13.3.1 , macOS Ventura 13.3.1 (build 22E261) ( ANSSI-CC-2023/61)