CVE DATABASE / CVE-2023-41061
CVE-2023-41061
Apple iOS, iPadOS, and watchOS Wallet Code Execution Vulnerability
Confirmed exploited in the wild. Added 2023-09-11.
Federal remediation due 2023-10-02.
Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Summary
A validation issue was addressed with improved logic. This issue is fixed in watchOS 9.6.2, iOS 16.6.1 and iPadOS 16.6.1. A maliciously crafted attachment may result in arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
CVSS 3.1 breakdown
| Base score | 7.8 (HIGH) |
| Vector | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
| Attack vector | LOCAL |
| Attack complexity | LOW |
| Privileges required | NONE |
| User interaction | REQUIRED |
| Scope | UNCHANGED |
| Confidentiality | HIGH |
| Integrity | HIGH |
| Availability | HIGH |
Weakness type (CWE)
Affected products
Use our free CVE Lookup tool for the latest NVD record, or browse the full CISA KEV catalog.
References
- http://seclists.org/fulldisclosure/2023/Sep/4
- http://seclists.org/fulldisclosure/2023/Sep/5
- https://support.apple.com/en-us/HT213905
- https://support.apple.com/en-us/HT213907
- https://support.apple.com/kb/HT213905
- https://support.apple.com/kb/HT213907
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-41061
Data: NIST NVD + CISA KEV. NVD last modified 2025-10-23. Always verify against the vendor advisory before acting.