CVE-2023-32434

Published Jun 23, 2023

Last updated 6 months ago

Overview

Description
An integer overflow was addressed with improved input validation. This issue is fixed in watchOS 9.5.2, macOS Big Sur 11.7.8, iOS 15.7.7 and iPadOS 15.7.7, macOS Monterey 12.6.7, watchOS 8.8.1, iOS 16.5.1 and iPadOS 16.5.1, macOS Ventura 13.4.1. An app may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.
Source
product-security@apple.com
NVD status
Analyzed
Products
ipados, iphone_os, macos, watchos

Risk scores

CVSS 3.1

Type
Primary
Base score
7.8
Impact score
5.9
Exploitability score
1.8
Vector string
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Severity
HIGH

Known exploits

Data from CISA

Vulnerability name
Apple Multiple Products Integer Overflow Vulnerability
Exploit added on
Jun 23, 2023
Exploit action due
Jul 14, 2023
Required action
Apply updates per vendor instructions.

Weaknesses

nvd@nist.gov
CWE-190
134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE-190

Social media

Hype score
Not currently trending
  1. TRC analysis reveals the Coruna exploit kit has transitioned from government surveillance tool to widespread cybercriminal weapon targeting iOS devices. Attackers chain CVE-2023-32434 and CVE-2023-38606 to achieve kernel-level compromise and establish persistent C2 channels. This

    @aviatrixtrc

    27 Mar 2026

    50 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  2. The Coruna iOS exploit kit reuses exploits from Operation Triangulation, including CVE-2023-32434 & CVE-2023-38606. Originally used in targeted espionage, it’s now seen in broader attacks, highlighting the growing proliferation of advanced exploit tools. Read:

    @ArmoredMobile

    27 Mar 2026

    42 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  3. Coruna iOS kit: 23 exploits, 5 chains, nation-state code now in criminal hands. CVE-2023-32434 gives full kernel control — same vuln from 2023 Operation Triangulation spyware. First confirmed mass iOS exploitation. CISA patch deadline was today. https://t.co/nzYQfOd5ku

    @CybrPulse

    26 Mar 2026

    35 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  4. [Securelist] Coruna: the framework used in Operation Triangulation. Kaspersky GReAT experts look into the Coruna exploit kit targeting iPhones. We discovered that the kernel exploit for CVE-2023-32434 and CVE-2023-38606 is an updated version of the... https://t.co/PhfzEhsBnN

    @shah_sheikh

    26 Mar 2026

    27 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  5. Coruna : nouveau spyware iOS ciblant iOS, lié à l'Opération Triangulation. Les failles zero-day CVE-2023-32434 & CVE-2023-38606 ont été découvertes par Kaspersky. #Cybersecurity #InfoSec #Vulnerability https://t.co/qzpqJfcK2B

    @cyberwatcher_

    5 Mar 2026

    21 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  6. セキュリティ研究者たちは、Apple iOSデバイスを対象とした新しいカーネルエクスプロイト「Trigon」を発表した。これはXNUカーネルの仮想メモリサブシステムに存在する重大な脆弱性(CVE-2023-32434)を利用している。… https://t.co/mErqW25ysP

    @yousukezan

    3 Mar 2025

    3015 Impressions

    4 Retweets

    35 Likes

    12 Bookmarks

    0 Replies

    0 Quotes

  7. ⚠️ Vulnerability Alert: Trigon iOS Kernel Exploit 📅 Timeline: Disclosure: 2023-06-23, Patch: 2023-06-23 🆔cveId: CVE-2023-32434 📊baseScore: 7.8 📏cvssMetrics: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H cvssSeverity: High 🟠 🛠️exploitMaturity: Actively Exploited… https://t.co/dWE

    @syedaquib77

    3 Mar 2025

    45 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  8. Alfie CG publishes write-up on Trigon, a deterministic kernel exploit based on CVE-2023-32434 that can’t fail https://t.co/aJl47p9otZ

    @iDownloadBlog

    2 Mar 2025

    1766 Impressions

    0 Retweets

    3 Likes

    1 Bookmark

    0 Replies

    0 Quotes

  9. Execing the CVE-2023-32434 using a deterministic exploit strategy (100% success rate)! ARM64e is certainly not as easy, but for now all of #arm64 should be doable with this strategy. https://t.co/ZpFv6AFQuo

    @byt3n33dl3

    23 Jan 2025

    28 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  10. Full kernel read/write with CVE-2023-32434 using a deterministic exploit strategy (100% success rate)! arm64e is certainly not as easy, but for now all of arm64 should be doable with this strategy. Shoutout to @staturnzdev and @imnotclarity for lots of help and ideas. https://t.c

    @alfiecg_dev

    22 Jan 2025

    25640 Impressions

    60 Retweets

    435 Likes

    94 Bookmarks

    14 Replies

    2 Quotes

  11. Top 5 Trending CVEs: 1 - CVE-2023-32434 2 - CVE-2024-49113 3 - CVE-2024-43405 4 - CVE-2024-10957 5 - CVE-2024-30078 #cve #cvetrends #cveshield #cybersecurity https://t.co/4Fua3CAN6W

    @CVEShield

    6 Jan 2025

    17 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  12. CVE-2023-32434 is much more powerful than just a PUAF - it can also be used as a physical mapping primitive. This allows for a deterministic exploit that doesn’t use any memory corruption. I don’t have a complete exploit yet, but so far it’s been a fun project! https://t.co/hhvej

    @alfiecg_dev

    5 Jan 2025

    27201 Impressions

    26 Retweets

    266 Likes

    58 Bookmarks

    7 Replies

    2 Quotes

Configurations