{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"macOS Ventura versions ant\u00e9rieures \u00e0 13.2.1","product":{"name":"macOS","vendor":{"name":"Apple","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2023-23524","url":"https://www.cve.org/CVERecord?id=CVE-2023-23524"},{"name":"CVE-2023-23514","url":"https://www.cve.org/CVERecord?id=CVE-2023-23514"},{"name":"CVE-2023-23522","url":"https://www.cve.org/CVERecord?id=CVE-2023-23522"},{"name":"CVE-2023-23529","url":"https://www.cve.org/CVERecord?id=CVE-2023-23529"}],"links":[{"title":"Bulletin de s\u00e9curit\u00e9 Apple du 13 f\u00e9vrier 2023","url":"https://support.apple.com/en-us/HT213633"}],"reference":"CERTFR-2023-AVI-0152","revisions":[{"description":"Version initiale","revision_date":"2023-02-21T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">macOS Ventura</span>. Elles permettent \u00e0 un attaquant de\nprovoquer un d\u00e9ni de service \u00e0 distance, un contournement de la\npolitique de s\u00e9curit\u00e9, une ex\u00e9cution de code arbitraire \u00e0 distance et\nune atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans macOS Ventura","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Apple HT213633 du 13 f\u00e9vrier 2023","url":null}]}
