macOS 13.x < 13.6 Multiple Vulnerabilities (HT213931)

high Nessus Plugin ID 181763

Synopsis

The remote host is missing a macOS update that fixes multiple vulnerabilities

Description

The remote host is running a version of macOS / Mac OS X that is 13.x prior to 13.6. It is, therefore, affected by multiple vulnerabilities:

- A malicious app may be able to bypass signature validation. (CVE-2023-41991)

- A local attacker may be able to elevate their privileges (CVE-2023-41992)

Note that Nessus has not tested for these issues but has instead relied only on the operating system's self-reported version number.

Solution

Upgrade to macOS 13.6 or later.

See Also

https://support.apple.com/en-us/HT213931

Plugin Details

Severity: High

ID: 181763

File Name: macos_HT213931.nasl

Version: 1.9

Type: local

Agent: macosx

Published: 9/21/2023

Updated: 6/14/2024

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.6

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2023-41992

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7.2

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:apple:macos:13.0, cpe:/o:apple:mac_os_x:13.0

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/21/2023

Vulnerability Publication Date: 9/21/2023

CISA Known Exploited Vulnerability Due Dates: 10/16/2023

Reference Information

CVE: CVE-2023-41991, CVE-2023-41992

APPLE-SA: HT213931

IAVA: 2023-A-0503-S, 2023-A-0529-S