OVERVIEW:
Multiple vulnerabilities have been discovered in Apple Products, the most severe of which could allow for arbitrary code execution.
Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
THREAT INTELLIGENCE:
Apple is aware of a report that CVE-2023-32367 may have been actively exploited.
SYSTEMS AFFECTED:
RISK:
Government:
Businesses:
Home users: Low
TECHNICAL SUMMARY:
Multiple vulnerabilities have been discovered in Apple Products, the most severe of which could allow for arbitrary code execution. Details of the most critical vulnerabilities are as follows:
Tactic: Execution (TA0004):
Technique: Exploitation for Client Execution (T1203):
· An app may be able to cause unexpected system termination or read kernel memory (CVE-2023-32420)
· An app may be able to execute arbitrary code with kernel privileges (CVE-2023-27930, CVE-2023-32398, CVE-2023-28181)
· A remote user may be able to cause unexpected app termination or arbitrary code execution (CVE-2023-32412, CVE-2023-32387)
· A remote attacker may be able to cause arbitrary code execution (CVE-2023-32419)
· A remote user may be able to cause unexpected system termination or corrupt kernel memory (CVE-2023-27953, CVE-2023-27958)
· Parsing a maliciously crafted plist may lead to an unexpected app termination or arbitrary code execution (CVE-2023-27937)
· Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2023-32373)
· Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2023-23529)
Tactic: Privilege Escalation (TA0004):
Technique: Exploitation for Client Execution (T1203):
· An app may be able to gain root privileges (CVE-2023-32413, CVE-2023-32405)
Details of lower-severity vulnerabilities are as follows:
· Processing web content may disclose sensitive information (CVE-2023-32402, CVE-2023-32423, CVE-2023-28204)
· A sandboxed app may be able to collect system logs (CVE-2023-27945)
· An app may be able to leak sensitive kernel state (CVE-2023-32410)
· An app may be able to retain access to system configuration files even after its permission is revoked (CVE-2023-32357)
· A remote attacker may be able to break out of Web Content sandbox (CVE-2023-32409, CVE-2023-32414 )
· Entitlements and privacy permissions granted to this app may be used by a malicious app (CVE-2023-32400)
· An app may be able to disclose kernel memory (CVE-2023-32354)
· A sandboxed app may be able to observe system-wide network connections (CVE-2023-27940)
· An app may be able to access user-sensitive data (CVE-2023-27931)
· An archive may be able to bypass Gatekeeper checks (CVE-2023-32352)
· Processing a maliciously crafted image may result in disclosure of process memory (CVE-2023-32372)
· Processing a maliciously crafted image may lead to arbitrary code execution (CVE-2023-32384)
· An app may be able to disclose kernel memory (CVE-2023-32354, CVE-2023-32389)
· An app may be able to modify protected parts of the file system(CVE-2023-32376, CVE-2023-32397, CVE-2023-32369, CVE-2023-32355, CVE-2023-32395)
· Photos belonging to the Hidden Photos Album could be viewed without authentication through Visual Lookup(CVE-2023-32390)
· An app may be able to observe unprotected user data (CVE-2023-32386)
· An unauthenticated user may be able to access recently printed documents (CVE-2023-32360)
· An app may be able to bypass Privacy preferences (CVE-2023-3240, CVE-2023-32404, CVE-2023-32411, CVE-2023-28191, CVE-2023-32407, CVE-2023-32388)
· A shortcut may be able to use sensitive data with certain actions without prompting the user (CVE-2023-32391)
· An app may be able to access user-sensitive data (CVE-2023-23542)
· An app may be able to read sensitive location information (CVE-2023-32399, CVE-2023-32392, CVE-2023-32403, CVE-2023-32408, CVE-2023-32415)
· Processing a 3D model may result in disclosure of process memory (CVE-2023-32368, CVE-2023-32382, CVE-2023-32375)
· Processing a 3D model may lead to arbitrary code execution (CVE-2023-32380)
· An attacker with physical access to a locked Apple Watch may be able to view user photos or contacts via accessibility features (CVE-2023-32417)
· A person with physical access to a device may be able to view contact information from the lock screen (CVE-2023-32394)
· An app firewall setting may not take effect after exiting the Settings app (CVE-2023-28202)
· A remote attacker may be able to break out of Web Content sandbox (CVE-2023-32409)
· An app may be able to access data from other apps by enabling additional SQLite logging (CVE-2023-32422)
· Opening a PDF file may lead to unexpected app termination (CVE-2023-32385)
· Shake-to-undo may allow a deleted photo to be re-surfaced without authentication (CVE-2023-32365)
· An app may be able to access user-sensitive data (CVE-2023-32367)
Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
RECOMMENDATIONS:
We recommend the following actions be taken:
1. Apply the stable channel update provided by Apple to vulnerable systems immediately after appropriate testing. (M1051: Update Software)
2. Apply the Principle of Least Privilege to all systems and services. Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack. (M1026: Privileged Account Management)
3. Restrict use of certain websites, block downloads/attachments, block Javascript, restrict browser extensions, etc. (M1021: Restrict Web-Based Content)
4. Use capabilities to detect and block conditions that may lead to or be indicative of a software exploit occurring. (M1050: Exploit Protection)
REFERENCES:
Apple:
https://support.apple.com/en-us/HT213757
https://support.apple.com/en-us/HT213758
CVE:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23542
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27940
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27945
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28191
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32352
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32354
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32354
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32355
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32360
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32369
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32372
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32376
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32386
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32388
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32389
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32390
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32395
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32397
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32399
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32400
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32402
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32403
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32404
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32407
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32408
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32409
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32410
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32411
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32414
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32415
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32423