Skip to content

Threat Research Knowledge Base

CVE-2023-23533

Description

CVE-2023-23533 is a logic issue within macOS that could allow an application to modify protected parts of the file system. According to Kandji's analysis, this vulnerability allowed an attacker to swap the installer package after the system verified its code signature. The system would then install the supplied package instead of the original, enabling the attacker to bypass System Integrity Protection (SIP).

Get a Free Trial

Impact

Exploitation of this vulnerability could lead to unauthorized modification of protected file system areas by an application. The severity of this issue has been assessed as follows:

NIST assessment

CVSS v3.1 Base Score: 5.5 (Medium)

AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

CISA-ADP assessment

CVSS v3.1 Base Score: 5.5 (Medium)

AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

Has been exploited in the wild

No

Operating systems impacted

  • macOS Monterey (prior to 12.6.4)
  • macOS Ventura (prior to 13.3)

Apps impacted

No apps impacted

Learn more about it

Kandji Blog: Apple Mitigates Vulnerabilities in Installer Scripts

Kandji Blog: Apple Mitigates Vulnerabilities in Installer Scripts

Examines Apple’s steps to mitigate installer-script vulnerabilities by redesigning the PackageKit private framework after reviewing past exploit methods.

Read more

Related

Exploitation of this vulnerability could lead to unauthorized access to sensitive user data by an application. The severity of this issue has been assessed as follows:

Exploitation of this vulnerability could lead to unauthorized modification of protected file system areas by an application. The severity of this issue has been assessed as follows:

Exploitation of this vulnerability could lead to unauthorized access to sensitive user data by an application. The severity of this issue has been assessed as follows:

Manage and secure your Apple devices at scale.

Laptop and 2 popup windows