{"vulnerability": "CVE-2023-32530", "sightings": [{"uuid": "31ab4340-74f4-433a-afe6-fb7d0836b0bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32530", "type": "published-proof-of-concept", "source": "https://t.me/LockBitChannels/35126", "content": "A PoC for the CVE-2023-32530, for iOS/MacOS from Operation Triangulation discovered by Kaspersky\n- Tested on: iOS 16.3, 16.3.1, 16.4 and 16.5 (iPhone 14 Pro Max) and macOS 13.1 and 13.4 (MacBook Air M2 2022)\n- Fixed in iOS 16.5.1 and macOS 13.4.1\nhttps://github.com/felix-pb/kfd/blob/main/writeups/smith.md", "creation_timestamp": "2024-09-04T22:15:58.000000Z"}, {"uuid": "2777e3a7-6939-4f5c-8dbe-74e2ed900844", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32530", "type": "published-proof-of-concept", "source": "https://t.me/LockBitChannels/19463", "content": "A PoC for the CVE-2023-32530, for iOS/MacOS from Operation Triangulation discovered by Kaspersky\n- Tested on: iOS 16.3, 16.3.1, 16.4 and 16.5 (iPhone 14 Pro Max) and macOS 13.1 and 13.4 (MacBook Air M2 2022)\n- Fixed in iOS 16.5.1 and macOS 13.4.1\nhttps://github.com/felix-pb/kfd/blob/main/writeups/smith.md", "creation_timestamp": "2024-08-19T01:37:17.000000Z"}, {"uuid": "23199c79-40f7-4c6b-a653-be7f38e6819e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32530", "type": "published-proof-of-concept", "source": "https://t.me/Teamx1945x/1126", "content": "(PoC) \u0644\u0640 CVE-2023-32530\u060c \u0644\u0646\u0638\u0627\u0645 iOS/MacOS \u0645\u0646 \u0639\u0645\u0644\u064a\u0629 Triangulation \u0627\u0644\u062a\u064a \u0627\u0643\u062a\u0634\u0641\u0647\u0627 Kaspersky\n\n- \u062a\u0645 \u0627\u0644\u0627\u062e\u062a\u0628\u0627\u0631 \u0639\u0644\u0649: iOS 16.3 \u064816.3.1 \u064816.4 \u064816.5 (iPhone 14 Pro Max) \u0648macOS 13.1 \u064813.4 (MacBook Air M2 2022)\n- \u062a\u0645 \u0625\u0635\u0644\u0627\u062d\u0647 \u0641\u064a iOS 16.5.1 \u0648macOS 13.4.1\n\nhttps://github.com/felix-pb/kfd/blob/main/writeups/smith.md", "creation_timestamp": "2024-03-29T18:32:08.000000Z"}, {"uuid": "c225f438-e2df-4e0c-a1ef-9e11dddefa89", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32530", "type": "published-proof-of-concept", "source": "https://t.me/LockBitChannels/83037", "content": "A PoC for the CVE-2023-32530, for iOS/MacOS from Operation Triangulation discovered by Kaspersky\n- Tested on: iOS 16.3, 16.3.1, 16.4 and 16.5 (iPhone 14 Pro Max) and macOS 13.1 and 13.4 (MacBook Air M2 2022)\n- Fixed in iOS 16.5.1 and macOS 13.4.1\nhttps://github.com/felix-pb/kfd/blob/main/writeups/smith.md", "creation_timestamp": "2024-08-19T01:37:20.000000Z"}, {"uuid": "4d82d3fa-cf39-4701-b700-8c38825e1d29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32530", "type": "published-proof-of-concept", "source": "https://t.me/LockBitChannels/98754", "content": "A PoC for the CVE-2023-32530, for iOS/MacOS from Operation Triangulation discovered by Kaspersky\n- Tested on: iOS 16.3, 16.3.1, 16.4 and 16.5 (iPhone 14 Pro Max) and macOS 13.1 and 13.4 (MacBook Air M2 2022)\n- Fixed in iOS 16.5.1 and macOS 13.4.1\nhttps://github.com/felix-pb/kfd/blob/main/writeups/smith.md", "creation_timestamp": "2024-09-04T22:15:56.000000Z"}, {"uuid": "6958de74-29eb-4f43-966d-d00ff9cd12bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32530", "type": "published-proof-of-concept", "source": "Telegram/0CHHt8ne91zjp2ceesrh6kQuN3rXIHQ6pdvfntqkcqmbFwey", "content": "", "creation_timestamp": "2024-03-06T12:55:31.000000Z"}, {"uuid": "790da8f9-a44e-4b57-994a-af550da153d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32530", "type": "published-proof-of-concept", "source": "Telegram/l4ck3lAWlHO8VN8NzxDvl1KGGOetJO1ICELrbrI_r02cfHc", "content": "", "creation_timestamp": "2024-09-04T22:16:15.000000Z"}, {"uuid": "ad2006bf-a927-4c1f-a017-0f4f65e37bcf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32530", "type": "published-proof-of-concept", "source": "Telegram/u7gNnPnM2ORCu1I_9EsMbwG27-X6ApjvgklPhfIw5C5VNlRi", "content": "", "creation_timestamp": "2024-11-04T15:39:04.000000Z"}, {"uuid": "682095b1-0f88-489f-a409-b2062b3cb688", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32530", "type": "published-proof-of-concept", "source": "Telegram/ThLXvPFRDPWhilIAcLP-Dscdr5kBFQwsBHKFOhYAj1n6fP6R", "content": "", "creation_timestamp": "2024-12-20T19:57:20.000000Z"}, {"uuid": "6779d3b4-1718-4641-bd1e-06e0b2d5d5f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32530", "type": "published-proof-of-concept", "source": "Telegram/RRQtQSr5FcINKnjxf5IEdSUHGD07XJ2YxeVqIVXxSku8qfA", "content": "", "creation_timestamp": "2024-09-04T22:16:14.000000Z"}, {"uuid": "659612c6-15d6-4365-a271-0b0e6ace4d32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32530", "type": "published-proof-of-concept", "source": "Telegram/dCyXUR8C9xWjvkM1T-3xRPIjh82Hf1zcRw914Up1GBrfH7k", "content": "", "creation_timestamp": "2024-08-19T01:37:41.000000Z"}, {"uuid": "31433a0c-6243-4bcc-b407-7058652a0f9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32530", "type": "published-proof-of-concept", "source": "Telegram/BdA57Em_A4c1EKQsreXBpBs--lU2_Fc5OYvXZ5Rb0mV6-84", "content": "", "creation_timestamp": "2024-08-19T01:37:42.000000Z"}, {"uuid": "28da0b7d-2f09-40d5-996b-2c59a828c9e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32530", "type": "published-proof-of-concept", "source": "Telegram/pFdjHs5JQSi1WMXkolOR4E95mWeI2FUx8bWBTLOI4vS1y5w7", "content": "", "creation_timestamp": "2024-11-04T15:38:59.000000Z"}, {"uuid": "d0d6f1be-5042-4b19-93f7-0b131d4affb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32530", "type": "seen", "source": "https://t.me/arpsyndicate/682", "content": "#ExploitObserverAlert\n\nCVE-2023-32529\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-32529. Vulnerable modules of Trend Micro Apex Central (on-premise) contain vulnerabilities which would allow authenticated users to perform a SQL injection that could lead to remote code execution.  Please note: an attacker must first obtain authentication on the target system in order to exploit these vulnerabilities.  This is similar to, but not identical to CVE-2023-32530.\n\nFIRST-EPSS: 0.003400000\nNVD-IS: 5.9\nNVD-ES: 2.8", "creation_timestamp": "2023-11-29T06:31:06.000000Z"}, {"uuid": "2067a75d-b9d6-4c59-96f5-19d89f75b3dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32530", "type": "published-proof-of-concept", "source": "Telegram/a-eFtgvTGjisJoqEIHuAsSqExXEnCdI-yWQjP2MBY2x-nqxv", "content": "", "creation_timestamp": "2024-12-20T19:57:22.000000Z"}, {"uuid": "a433b675-90d0-4fb2-8f12-82bfd9bd90c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32530", "type": "published-proof-of-concept", "source": "https://t.me/AnonymousEgypt/23575", "content": "A PoC for the CVE-2023-32530, for iOS/MacOS from Operation Triangulation discovered by Kaspersky\n- Tested on: iOS 16.3, 16.3.1, 16.4 and 16.5 (iPhone 14 Pro Max) and macOS 13.1 and 13.4 (MacBook Air M2 2022)\n- Fixed in iOS 16.5.1 and macOS 13.4.1\nhttps://github.com/felix-pb/kfd/blob/main/writeups/smith.md", "creation_timestamp": "2024-09-04T22:14:02.000000Z"}, {"uuid": "19e24337-fede-4c32-a725-e6cc1f4ad0fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32530", "type": "seen", "source": "https://t.me/cibsecurity/65552", "content": "\u203c CVE-2023-32529 \u203c\n\nVulnerable modules of Trend Micro Apex Central (on-premise) contain vulnerabilities which would allow authenticated users to perform a SQL injection that could lead to remote code execution.Please note: an attacker must first obtain authentication on the target system in order to exploit these vulnerabilities.This is similar to, but not identical to CVE-2023-32530.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-27T02:25:00.000000Z"}, {"uuid": "0cca7113-ea0e-4fd4-9d71-2b6dca0d843f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32530", "type": "seen", "source": "https://t.me/cibsecurity/65539", "content": "\u203c CVE-2023-32530 \u203c\n\nVulnerable modules of Trend Micro Apex Central (on-premise) contain vulnerabilities which would allow authenticated users to perform a SQL injection that could lead to remote code execution.Please note: an attacker must first obtain authentication on the target system in order to exploit these vulnerabilities.This is similar to, but not identical to CVE-2023-32529.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-27T02:21:54.000000Z"}, {"uuid": "db5a1d68-dd10-4c9d-bda4-6076988d98dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32530", "type": "published-proof-of-concept", "source": "https://t.me/androidMalware/2114", "content": "A PoC for the CVE-2023-32530, for iOS/MacOS from Operation Triangulation discovered by Kaspersky\n- Tested on: iOS 16.3, 16.3.1, 16.4 and 16.5 (iPhone 14 Pro Max) and macOS 13.1 and 13.4 (MacBook Air M2 2022)\n- Fixed in iOS 16.5.1 and macOS 13.4.1\nhttps://github.com/felix-pb/kfd/blob/main/writeups/smith.md", "creation_timestamp": "2024-01-23T09:19:15.000000Z"}, {"uuid": "1fc99b49-5413-475d-abf3-395b91e09196", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32530", "type": "published-proof-of-concept", "source": "Telegram/x7jU1rzFVYNcnV5sOEc81PLKtY3I9ZlCS1DOBoGGwn2aT_U", "content": "", "creation_timestamp": "2024-11-04T15:38:11.000000Z"}]}