PatchSiren cyber security CVE debrief
CVE-2016-7623 Apple CVE debrief
CVE-2016-7623 is an Apple WebKit information-disclosure issue that can be triggered from a website. According to the CVE description, remote attackers could obtain sensitive information via a blob URL. The NVD record maps the issue to Apple iPhone OS and Safari, with confidentiality impact only and no integrity or availability impact. This is a browser-facing flaw, so exposure depends on users visiting a malicious or compromised site while running affected Apple software.
- Vendor
- Apple
- Product
- CVE-2016-7623
- CVSS
- MEDIUM 6.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-20
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-20
- Advisory updated
- 2026-05-13
Who should care
Organizations and individuals still running affected Apple iOS/iPhone OS or Safari versions should care most, especially where users browse untrusted websites or where devices are not rapidly updated. Fleet managers should prioritize legacy Apple devices and any environment that cannot easily move to supported, patched releases.
Technical summary
The supplied record identifies the vulnerable component as WebKit. The CVSS vector is CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N, which indicates a network-reachable issue requiring user interaction and affecting confidentiality only. NVD lists vulnerable Apple iPhone OS versions through 10.1.1 and Safari versions through 10.0.1, while the CVE description says iOS before 10.2 and Safari before 10.0.2. The practical takeaway is that affected browser and OS builds can disclose sensitive data when a crafted blob URL is processed in the context of a web page.
Defensive priority
Medium. The issue is publicly disclosed, user-interaction dependent, and limited to confidentiality impact, but it still warrants prompt patching because browser/WebKit flaws can be reached at web scale and may expose sensitive data from affected devices.
Recommended defensive actions
- Update Apple iOS/iPhone OS to a fixed release at or above the vendor-provided remediation level referenced by the advisory.
- Update Safari to a fixed release at or above the vendor-provided remediation level referenced by the advisory.
- Verify managed Apple devices have received the relevant Apple security updates linked in HT207421 and HT207422.
- Inventory legacy Apple devices and browsers that may still be on affected versions, especially where updates are delayed or unsupported.
- Treat unpatched WebKit/Safari exposure as a browsing-risk issue and reduce use of untrusted websites on affected systems until remediation is complete.
Evidence notes
This debrief is based on the supplied NVD record for CVE-2016-7623, which is marked Modified and published on 2017-02-20, and on the linked Apple advisories and third-party references included in the source corpus. The record names Apple as the vendor, WebKit as the affected component, and shows a CVSS v3.0 vector of CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N. The supplied enrichment indicates the issue is not in CISA KEV and no ransomware campaign use is recorded. Version boundaries differ slightly across supplied fields, so remediation should be validated against the official Apple advisories.
Official resources
-
CVE-2016-7623 CVE record
CVE.org
-
CVE-2016-7623 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
- Source reference
- Source reference
-
Mitigation or vendor reference
[email protected] - Vendor Advisory
-
Mitigation or vendor reference
[email protected] - Vendor Advisory
Publicly disclosed CVE published on 2017-02-20. No KEV listing is present in the supplied enrichment.