This page was not yet optimized for use on mobile devices.
CVE-2023-42856
Data ?
Vulnerability ID | CVE-2023-42856 |
---|---|
Published on | 25.10.2023 19:15 |
Severity | HIGH |
Vulnerable configurations ?
-
cpe:2.3:o:apple:macos:12.0:*:*:*:*:*:*:*,
cpe:2.3:o:apple:macos:12.0.0:*:*:*:*:*:*:*,
cpe:2.3:o:apple:macos:12.0.1:*:*:*:*:*:*:*,
cpe:2.3:o:apple:macos:12.1:*:*:*:*:*:*:*,
cpe:2.3:o:apple:macos:12.2:*:*:*:*:*:*:*,
cpe:2.3:o:apple:macos:12.2.1:*:*:*:*:*:*:*,
cpe:2.3:o:apple:macos:12.3:*:*:*:*:*:*:*,
cpe:2.3:o:apple:macos:12.4:*:*:*:*:*:*:*,
cpe:2.3:o:apple:macos:12.5:*:*:*:*:*:*:*,
cpe:2.3:o:apple:macos:12.5.1:*:*:*:*:*:*:*,
…
Vulnerable certificates ?
The CVE was matched to the following certificates. This means the vulnerability likely affects said certified devices. However, this is an automated process that may have false positives and negatives.
Common Criteria certificates Display network
- Strong Customer Authentication pour Apple Pay sur Mac mini avec M1 et Magic keyboard avec Touch ID, exécutant macOS Monterey 12.3.1 (Version 12.3.1 (build 21E258))
- Apple macOS 13 Ventura
- Apple macOS 13 Ventura: FileVault
- Strong Customer Authentication for Apple Pay, on MacBook Air 2022 with M2 running macOS Ventura 13.3.1
- Strong Customer Authentication for Apple Pay on Mac mini with M2 and Magic keyboard with Touch ID, running macOS Ventura 13.3.1 , macOS Ventura 13.3.1 (build 22E261) ( ANSSI-CC-2023/61)
- Strong Customer Authentication pour Apple Pay sur MacBook Air 2020 avec M1 exécutant macOS Monterey 12.3.1 (Version 12.3.1 (build 21E258))