CVE-2023-28205
ENISA EUVD: EUVD-2023-31913 ↗
Exploited in the Wild
✓ Confirmed 0-Day
★ Google Project Zero
Triaged: March 3, 2026
26 articles
Published: 2023-04-10
EPSS Score
Source: FIRST.org · 2026-05-23
0.07%
probability
This CVE has a 0.07% probability
of being exploited in the next 30 days.
0%
Top 21.0th percentile of all CVEs
100%
CVSS v3.1
Source: VulnerabilityLookup (CIRCL)8.8
HIGH
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Description
VulnerabilityLookup (CNA)A use after free issue was addressed with improved memory management. This issue is fixed in Safari 16.4.1, iOS 15.7.5 and iPadOS 15.7.5, iOS 16.4.1 and iPadOS 16.4.1, macOS Ventura 13.3.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
Affected Products
Apple
iOS and iPadOS
unspecified
Apple
Safari
unspecified
Apple
macOS
unspecified
Apple
iOS and iPadOS
unspecified
Attack Intelligence
CWE-118
· Incorrect Access of Indexable Resource ('Range Error')
CWE-119
· Buffer Overflow
CWE-416
· Use After Free
CWE-664
· Improper Control of a Resource Through its Lifetime
CWE-666
· Operation on Resource in Wrong Phase of Lifetime
CWE-672
· Operation on a Resource after Expiration or Release
CWE-825
· Expired Pointer Dereference
Google Project Zero
Patched
April 7, 2023
Reported by
Clément Lecigne of Google's Threat Analysis Group and Donncha Ó Cearbhaill of Amnesty International’s Security Lab
Root Cause Analysis
???
Exploits & PoC
ntfargo/uaf-2023-28205
PoC CVE-2023-28205: Apple WebKit Use-After-Free Vulnerability
18
2024-12-01
seregonwar/uaf-2023-28205
PoC CVE-2023-28205: Apple WebKit Use-After-Free Vulnerability
8
2026-01-04
2 repos — triés par ⭐
Rechercher sur GitHub ↗
Signal Intelligence
Confidence
95%
EPSS
0.07%
CVSS v3.1
8.8
Mentions
26
Last Seen
Mar 11, 2025
CNA Information
CNA Assigner
apple
Analyst Note
This CVE is confirmed as a zero-day with active exploitation documented by Apple and reported by Google Project Zero. The vulnerability affects multiple Apple platforms with HIGH CVSS score (8.8), enabling arbitrary code execution through malicious web content, with confirmed in-the-wild exploitation in sophisticated attacks.
Triage Info
Decided atMar 03, 2026
Published DateApr 10, 2023