Risk | Low |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2023-27967 CVE-2023-27945 |
CWE-ID | CWE-119 CWE-264 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Apple Xcode Universal components / Libraries / Software for developers |
Vendor | Apple Inc. |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU74272
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-27967
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local application to execute arbitrary code on the system.
The vulnerability exists due to a boundary error in Dev Tools component of Xcode. A local application can trigger memory corruption and execute arbitrary code out of its sandbox or with certain elevated privileges.
MitigationInstall updates from vendor's website.
Vulnerable software versionsApple Xcode: 12.0 - 14.2
CPE2.3https://support.apple.com/en-us/HT213679
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU74273
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-27945
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper handling of permissions in Dev Tools component of Xcode. A local sandboxed application can collect system logs.
Install updates from vendor's website.
Vulnerable software versionsApple Xcode: 12.0 - 14.2
CPE2.3https://support.apple.com/en-us/HT213679
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.