Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-44201 (GCVE-0-2024-44201)
Vulnerability from cvelistv5 – Published: 2024-12-11 22:59 – Updated: 2025-11-03 22:08
VLAI?
EPSS
Summary
The issue was addressed with improved memory handling. This issue is fixed in iPadOS 17.7.3, macOS Ventura 13.7.2, iOS 18.1 and iPadOS 18.1, macOS Sonoma 14.7.2. Processing a malicious crafted file may lead to a denial-of-service.
Severity ?
5.5 (Medium)
CWE
- Processing a malicious crafted file may lead to a denial-of-service
Assigner
References
Impacted products
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-44201",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-13T18:30:31.191160Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-404",
"description": "CWE-404 Improper Resource Shutdown or Release",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-13T18:31:43.595Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2025-11-03T22:08:05.787Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "http://seclists.org/fulldisclosure/2024/Dec/9"
},
{
"url": "http://seclists.org/fulldisclosure/2024/Dec/8"
},
{
"url": "http://seclists.org/fulldisclosure/2024/Dec/6"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "macOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "13.7",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "iPadOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "17.7",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "macOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "14.7",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "iOS and iPadOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "18.1",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved memory handling. This issue is fixed in iPadOS 17.7.3, macOS Ventura 13.7.2, iOS 18.1 and iPadOS 18.1, macOS Sonoma 14.7.2. Processing a malicious crafted file may lead to a denial-of-service."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Processing a malicious crafted file may lead to a denial-of-service",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T22:59:08.652Z",
"orgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"shortName": "apple"
},
"references": [
{
"url": "https://support.apple.com/en-us/121842"
},
{
"url": "https://support.apple.com/en-us/121838"
},
{
"url": "https://support.apple.com/en-us/121840"
},
{
"url": "https://support.apple.com/en-us/121563"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"assignerShortName": "apple",
"cveId": "CVE-2024-44201",
"datePublished": "2024-12-11T22:59:08.652Z",
"dateReserved": "2024-08-20T21:42:05.937Z",
"dateUpdated": "2025-11-03T22:08:05.787Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2024-44201\",\"sourceIdentifier\":\"product-security@apple.com\",\"published\":\"2024-12-12T02:15:23.313\",\"lastModified\":\"2025-11-03T22:18:25.473\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The issue was addressed with improved memory handling. This issue is fixed in iPadOS 17.7.3, macOS Ventura 13.7.2, iOS 18.1 and iPadOS 18.1, macOS Sonoma 14.7.2. Processing a malicious crafted file may lead to a denial-of-service.\"},{\"lang\":\"es\",\"value\":\"El problema se solucion\u00f3 mejorando el manejo de la memoria. Este problema se solucion\u00f3 en iPadOS 17.7.3, macOS Ventura 13.7.2, iOS 18.1 y iPadOS 18.1, macOS Sonoma 14.7.2. El procesamiento de un archivo manipulado con fines malintencionados puede provocar una denegaci\u00f3n de servicio.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-404\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"17.7.3\",\"matchCriteriaId\":\"03B2CC01-9482-433A-A0D3-076683F4B012\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"18.0\",\"versionEndExcluding\":\"18.1\",\"matchCriteriaId\":\"C1AEAF56-49F9-4F1F-993C-97ECD7BDA012\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"18.1\",\"matchCriteriaId\":\"B9A26654-0DDB-4D4D-BB1E-C65C3339148E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0\",\"versionEndExcluding\":\"13.7.2\",\"matchCriteriaId\":\"30D66414-3769-4793-A9BF-A39E8CAB31D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.0\",\"versionEndExcluding\":\"14.7.2\",\"matchCriteriaId\":\"617CA14A-5EA4-4112-A564-DB1A5109A066\"}]}]}],\"references\":[{\"url\":\"https://support.apple.com/en-us/121563\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/121838\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/121840\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/121842\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2024/Dec/6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://seclists.org/fulldisclosure/2024/Dec/8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://seclists.org/fulldisclosure/2024/Dec/9\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.5, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-44201\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-12-13T18:30:31.191160Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-404\", \"description\": \"CWE-404 Improper Resource Shutdown or Release\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-12-13T18:31:35.627Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"Apple\", \"product\": \"macOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"13.7\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"iPadOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"17.7\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"macOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"14.7\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"iOS and iPadOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"18.1\", \"versionType\": \"custom\"}]}], \"references\": [{\"url\": \"https://support.apple.com/en-us/121842\"}, {\"url\": \"https://support.apple.com/en-us/121838\"}, {\"url\": \"https://support.apple.com/en-us/121840\"}, {\"url\": \"https://support.apple.com/en-us/121563\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"The issue was addressed with improved memory handling. This issue is fixed in iPadOS 17.7.3, macOS Ventura 13.7.2, iOS 18.1 and iPadOS 18.1, macOS Sonoma 14.7.2. Processing a malicious crafted file may lead to a denial-of-service.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"Processing a malicious crafted file may lead to a denial-of-service\"}]}], \"providerMetadata\": {\"orgId\": \"286789f9-fbc2-4510-9f9a-43facdede74c\", \"shortName\": \"apple\", \"dateUpdated\": \"2024-12-11T22:59:08.652Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-44201\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-13T18:31:43.595Z\", \"dateReserved\": \"2024-08-20T21:42:05.937Z\", \"assignerOrgId\": \"286789f9-fbc2-4510-9f9a-43facdede74c\", \"datePublished\": \"2024-12-11T22:59:08.652Z\", \"assignerShortName\": \"apple\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
WID-SEC-W-2024-3691
Vulnerability from csaf_certbund - Published: 2024-12-11 23:00 - Updated: 2025-05-12 22:00Summary
Apple iOS und iPadOS: Mehrere Schwachstellen
Severity
Hoch
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Das Apple iOS (vormals iPhone OS) ist das Betriebssystem für das von Apple entwickelte Smartphone iPhone, iPad und iPod Touch.
Das Apple iPadOS ist das Betriebssystem für das von Apple entwickelte iPad.
Angriff: Ein Angreifer kann mehrere Schwachstellen in Apple iOS und Apple iPadOS ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, vertrauliche Informationen offenzulegen oder einen Denial-of-Service-Zustand zu erzeugen.
Betroffene Betriebssysteme: - iPhoneOS
References
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Das Apple iOS (vormals iPhone OS) ist das Betriebssystem f\u00fcr das von Apple entwickelte Smartphone iPhone, iPad und iPod Touch.\r\nDas Apple iPadOS ist das Betriebssystem f\u00fcr das von Apple entwickelte iPad.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Apple iOS und Apple iPadOS ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder einen Denial-of-Service-Zustand zu erzeugen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- iPhoneOS",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-3691 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3691.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-3691 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3691"
},
{
"category": "external",
"summary": "Apple Security Announce vom 2024-12-11",
"url": "https://lists.apple.com/archives/security-announce/2024/Dec/msg00000.html"
},
{
"category": "external",
"summary": "Apple Security Announce vom 2024-12-11",
"url": "https://lists.apple.com/archives/security-announce/2024/Dec/msg00001.html"
}
],
"source_lang": "en-US",
"title": "Apple iOS und iPadOS: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-05-12T22:00:00.000+00:00",
"generator": {
"date": "2025-05-13T06:01:00.900+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2024-3691",
"initial_release_date": "2024-12-11T23:00:00.000+00:00",
"revision_history": [
{
"date": "2024-12-11T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-03-27T23:00:00.000+00:00",
"number": "2",
"summary": "CVE-2024-44276, CVE-2024-54512 erg\u00e4nzt"
},
{
"date": "2025-05-12T22:00:00.000+00:00",
"number": "3",
"summary": "CVE erg\u00e4nzt"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c18.2",
"product": {
"name": "Apple iOS \u003c18.2",
"product_id": "T039801"
}
},
{
"category": "product_version",
"name": "18.2",
"product": {
"name": "Apple iOS 18.2",
"product_id": "T039801-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:iphone_os:18.2"
}
}
}
],
"category": "product_name",
"name": "iOS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c18.2",
"product": {
"name": "Apple iPadOS \u003c18.2",
"product_id": "T039802"
}
},
{
"category": "product_version",
"name": "18.2",
"product": {
"name": "Apple iPadOS 18.2",
"product_id": "T039802-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:ipados:18.2"
}
}
},
{
"category": "product_version_range",
"name": "\u003c17.7.3",
"product": {
"name": "Apple iPadOS \u003c17.7.3",
"product_id": "T039803"
}
},
{
"category": "product_version",
"name": "17.7.3",
"product": {
"name": "Apple iPadOS 17.7.3",
"product_id": "T039803-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:ipados:17.7.3"
}
}
}
],
"category": "product_name",
"name": "iPadOS"
}
],
"category": "vendor",
"name": "Apple"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-44201",
"product_status": {
"known_affected": [
"T039803",
"T039802",
"T039801"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-44201"
},
{
"cve": "CVE-2024-44225",
"product_status": {
"known_affected": [
"T039803",
"T039802",
"T039801"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-44225"
},
{
"cve": "CVE-2024-44245",
"product_status": {
"known_affected": [
"T039803",
"T039802",
"T039801"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-44245"
},
{
"cve": "CVE-2024-44246",
"product_status": {
"known_affected": [
"T039803",
"T039802",
"T039801"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-44246"
},
{
"cve": "CVE-2024-44276",
"product_status": {
"known_affected": [
"T039803",
"T039802",
"T039801"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-44276"
},
{
"cve": "CVE-2024-45490",
"product_status": {
"known_affected": [
"T039803",
"T039802",
"T039801"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-45490"
},
{
"cve": "CVE-2024-54479",
"product_status": {
"known_affected": [
"T039803",
"T039802",
"T039801"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54479"
},
{
"cve": "CVE-2024-54485",
"product_status": {
"known_affected": [
"T039803",
"T039802",
"T039801"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54485"
},
{
"cve": "CVE-2024-54486",
"product_status": {
"known_affected": [
"T039803",
"T039802",
"T039801"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54486"
},
{
"cve": "CVE-2024-54492",
"product_status": {
"known_affected": [
"T039803",
"T039802",
"T039801"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54492"
},
{
"cve": "CVE-2024-54494",
"product_status": {
"known_affected": [
"T039803",
"T039802",
"T039801"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54494"
},
{
"cve": "CVE-2024-54500",
"product_status": {
"known_affected": [
"T039803",
"T039802",
"T039801"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54500"
},
{
"cve": "CVE-2024-54501",
"product_status": {
"known_affected": [
"T039803",
"T039802",
"T039801"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54501"
},
{
"cve": "CVE-2024-54502",
"product_status": {
"known_affected": [
"T039803",
"T039802",
"T039801"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54502"
},
{
"cve": "CVE-2024-54503",
"product_status": {
"known_affected": [
"T039803",
"T039802",
"T039801"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54503"
},
{
"cve": "CVE-2024-54505",
"product_status": {
"known_affected": [
"T039803",
"T039802",
"T039801"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54505"
},
{
"cve": "CVE-2024-54508",
"product_status": {
"known_affected": [
"T039803",
"T039802",
"T039801"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54508"
},
{
"cve": "CVE-2024-54510",
"product_status": {
"known_affected": [
"T039803",
"T039802",
"T039801"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54510"
},
{
"cve": "CVE-2024-54512",
"product_status": {
"known_affected": [
"T039803",
"T039802",
"T039801"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54512"
},
{
"cve": "CVE-2024-54513",
"product_status": {
"known_affected": [
"T039803",
"T039802",
"T039801"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54513"
},
{
"cve": "CVE-2024-54514",
"product_status": {
"known_affected": [
"T039803",
"T039802",
"T039801"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54514"
},
{
"cve": "CVE-2024-54526",
"product_status": {
"known_affected": [
"T039803",
"T039802",
"T039801"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54526"
},
{
"cve": "CVE-2024-54527",
"product_status": {
"known_affected": [
"T039803",
"T039802",
"T039801"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54527"
},
{
"cve": "CVE-2024-54534",
"product_status": {
"known_affected": [
"T039803",
"T039802",
"T039801"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54534"
},
{
"cve": "CVE-2025-24091",
"product_status": {
"known_affected": [
"T039803",
"T039802",
"T039801"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2025-24091"
}
]
}
WID-SEC-W-2024-3692
Vulnerability from csaf_certbund - Published: 2024-12-11 23:00 - Updated: 2025-08-31 22:00Summary
Apple macOS: Mehrere Schwachstellen
Severity
Hoch
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.
Angriff: Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsmaßnahmen zu umgehen oder einen Man-in-the-Middle-Angriff durchzuführen.
Betroffene Betriebssysteme: - MacOS X
References
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Man-in-the-Middle-Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- MacOS X",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-3692 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3692.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-3692 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3692"
},
{
"category": "external",
"summary": "Apple Security Announce vom 2024-12-11",
"url": "https://lists.apple.com/archives/security-announce/2024/Dec/msg00002.html"
},
{
"category": "external",
"summary": "Apple Security Announce vom 2024-12-11",
"url": "https://lists.apple.com/archives/security-announce/2024/Dec/msg00003.html"
},
{
"category": "external",
"summary": "Apple Security Announce vom 2024-12-11",
"url": "https://lists.apple.com/archives/security-announce/2024/Dec/msg00004.html"
},
{
"category": "external",
"summary": "Mickey\u0027s Blogs vom 2025-01-08",
"url": "https://jhftss.github.io/CVE-2024-54527-MediaLibraryService-Full-TCC-Bypass/"
},
{
"category": "external",
"summary": "Cyber Security News vom 2025-01-12",
"url": "https://cybersecuritynews.com/macos-sandbox-vulnerability-cve-2024-54498-poc-exploit-released/"
},
{
"category": "external",
"summary": "PoC auf GitHub vom 2025-01-12",
"url": "https://github.com/koreacsl/SysBumps"
}
],
"source_lang": "en-US",
"title": "Apple macOS: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-08-31T22:00:00.000+00:00",
"generator": {
"date": "2025-09-01T07:26:22.133+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2024-3692",
"initial_release_date": "2024-12-11T23:00:00.000+00:00",
"revision_history": [
{
"date": "2024-12-11T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-01-08T23:00:00.000+00:00",
"number": "2",
"summary": "PoC aufgenommen"
},
{
"date": "2025-01-12T23:00:00.000+00:00",
"number": "3",
"summary": "weiterer PoC aufgenommen"
},
{
"date": "2025-02-12T23:00:00.000+00:00",
"number": "4",
"summary": "weiteren PoC aufgenommen"
},
{
"date": "2025-03-17T23:00:00.000+00:00",
"number": "5",
"summary": "CVE\u0027s erg\u00e4nzt"
},
{
"date": "2025-03-24T23:00:00.000+00:00",
"number": "6",
"summary": "CVE-Nummern erg\u00e4nzt"
},
{
"date": "2025-08-28T22:00:00.000+00:00",
"number": "7",
"summary": "CVE-2024-44271, CVE-2024-54568 aufgenommen"
},
{
"date": "2025-08-31T22:00:00.000+00:00",
"number": "8",
"summary": "Referenz(en) aufgenommen: EUVD-2024-54931"
}
],
"status": "final",
"version": "8"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c15.2",
"product": {
"name": "Apple macOS \u003c15.2",
"product_id": "T039820"
}
},
{
"category": "product_version",
"name": "15.2",
"product": {
"name": "Apple macOS 15.2",
"product_id": "T039820-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:15.2"
}
}
},
{
"category": "product_version_range",
"name": "\u003c14.7.2",
"product": {
"name": "Apple macOS \u003c14.7.2",
"product_id": "T039821"
}
},
{
"category": "product_version",
"name": "14.7.2",
"product": {
"name": "Apple macOS 14.7.2",
"product_id": "T039821-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:14.7.2"
}
}
},
{
"category": "product_version_range",
"name": "\u003c13.7.2",
"product": {
"name": "Apple macOS \u003c13.7.2",
"product_id": "T039822"
}
},
{
"category": "product_version",
"name": "13.7.2",
"product": {
"name": "Apple macOS 13.7.2",
"product_id": "T039822-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:13.7.2"
}
}
}
],
"category": "product_name",
"name": "macOS"
}
],
"category": "vendor",
"name": "Apple"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-32395",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2023-32395"
},
{
"cve": "CVE-2024-44201",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-44201"
},
{
"cve": "CVE-2024-44220",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-44220"
},
{
"cve": "CVE-2024-44224",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-44224"
},
{
"cve": "CVE-2024-44225",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-44225"
},
{
"cve": "CVE-2024-44243",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-44243"
},
{
"cve": "CVE-2024-44245",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-44245"
},
{
"cve": "CVE-2024-44246",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-44246"
},
{
"cve": "CVE-2024-44248",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-44248"
},
{
"cve": "CVE-2024-44271",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-44271"
},
{
"cve": "CVE-2024-44291",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-44291"
},
{
"cve": "CVE-2024-44300",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-44300"
},
{
"cve": "CVE-2024-45490",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-45490"
},
{
"cve": "CVE-2024-54465",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54465"
},
{
"cve": "CVE-2024-54466",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54466"
},
{
"cve": "CVE-2024-54468",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54468"
},
{
"cve": "CVE-2024-54474",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54474"
},
{
"cve": "CVE-2024-54475",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54475"
},
{
"cve": "CVE-2024-54476",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54476"
},
{
"cve": "CVE-2024-54477",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54477"
},
{
"cve": "CVE-2024-54479",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54479"
},
{
"cve": "CVE-2024-54484",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54484"
},
{
"cve": "CVE-2024-54486",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54486"
},
{
"cve": "CVE-2024-54488",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54488"
},
{
"cve": "CVE-2024-54489",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54489"
},
{
"cve": "CVE-2024-54490",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54490"
},
{
"cve": "CVE-2024-54491",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54491"
},
{
"cve": "CVE-2024-54492",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54492"
},
{
"cve": "CVE-2024-54493",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54493"
},
{
"cve": "CVE-2024-54494",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54494"
},
{
"cve": "CVE-2024-54495",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54495"
},
{
"cve": "CVE-2024-54498",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54498"
},
{
"cve": "CVE-2024-54499",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54499"
},
{
"cve": "CVE-2024-54500",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54500"
},
{
"cve": "CVE-2024-54501",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54501"
},
{
"cve": "CVE-2024-54502",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54502"
},
{
"cve": "CVE-2024-54504",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54504"
},
{
"cve": "CVE-2024-54505",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54505"
},
{
"cve": "CVE-2024-54506",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54506"
},
{
"cve": "CVE-2024-54507",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54507"
},
{
"cve": "CVE-2024-54508",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54508"
},
{
"cve": "CVE-2024-54510",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54510"
},
{
"cve": "CVE-2024-54513",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54513"
},
{
"cve": "CVE-2024-54514",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54514"
},
{
"cve": "CVE-2024-54515",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54515"
},
{
"cve": "CVE-2024-54516",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54516"
},
{
"cve": "CVE-2024-54517",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54517"
},
{
"cve": "CVE-2024-54518",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54518"
},
{
"cve": "CVE-2024-54519",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54519"
},
{
"cve": "CVE-2024-54520",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54520"
},
{
"cve": "CVE-2024-54522",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54522"
},
{
"cve": "CVE-2024-54523",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54523"
},
{
"cve": "CVE-2024-54524",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54524"
},
{
"cve": "CVE-2024-54525",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54525"
},
{
"cve": "CVE-2024-54526",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54526"
},
{
"cve": "CVE-2024-54527",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54527"
},
{
"cve": "CVE-2024-54528",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54528"
},
{
"cve": "CVE-2024-54529",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54529"
},
{
"cve": "CVE-2024-54530",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54530"
},
{
"cve": "CVE-2024-54531",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54531"
},
{
"cve": "CVE-2024-54534",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54534"
},
{
"cve": "CVE-2024-54536",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54536"
},
{
"cve": "CVE-2024-54537",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54537"
},
{
"cve": "CVE-2024-54539",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54539"
},
{
"cve": "CVE-2024-54541",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54541"
},
{
"cve": "CVE-2024-54542",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54542"
},
{
"cve": "CVE-2024-54547",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54547"
},
{
"cve": "CVE-2024-54549",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54549"
},
{
"cve": "CVE-2024-54550",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54550"
},
{
"cve": "CVE-2024-54557",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54557"
},
{
"cve": "CVE-2024-54559",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54559"
},
{
"cve": "CVE-2024-54565",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54565"
},
{
"cve": "CVE-2024-54568",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54568"
}
]
}
WID-SEC-W-2024-3291
Vulnerability from csaf_certbund - Published: 2024-10-28 23:00 - Updated: 2025-09-15 22:00Summary
Apple macOS: Mehrere Schwachstellen
Severity
Mittel
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.
Angriff: Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme: - MacOS X
References
| URL | Category | |
|---|---|---|
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- MacOS X",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-3291 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3291.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-3291 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3291"
},
{
"category": "external",
"summary": "Apple Security Advisory vom 2024-10-28",
"url": "https://lists.apple.com/archives/security-announce/2024/Oct/msg00003.html"
},
{
"category": "external",
"summary": "Apple Security Advisory vom 2024-10-28",
"url": "https://lists.apple.com/archives/security-announce/2024/Oct/msg00004.html"
},
{
"category": "external",
"summary": "Apple Security Advisory vom 2024-10-28",
"url": "https://lists.apple.com/archives/security-announce/2024/Oct/msg00005.html"
}
],
"source_lang": "en-US",
"title": "Apple macOS: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-09-15T22:00:00.000+00:00",
"generator": {
"date": "2025-09-16T05:26:10.681+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2024-3291",
"initial_release_date": "2024-10-28T23:00:00.000+00:00",
"revision_history": [
{
"date": "2024-10-28T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-11-19T23:00:00.000+00:00",
"number": "2",
"summary": "CVE Nummern erg\u00e4nzt"
},
{
"date": "2024-12-11T23:00:00.000+00:00",
"number": "3",
"summary": "CVE Nummern erg\u00e4nzt"
},
{
"date": "2024-12-19T23:00:00.000+00:00",
"number": "4",
"summary": "CVE-2024-54538 erg\u00e4nzt"
},
{
"date": "2025-08-28T22:00:00.000+00:00",
"number": "5",
"summary": "CVE-2024-54554 erg\u00e4nzt"
},
{
"date": "2025-08-31T22:00:00.000+00:00",
"number": "6",
"summary": "Referenz(en) aufgenommen: EUVD-2024-54932"
},
{
"date": "2025-09-15T22:00:00.000+00:00",
"number": "7",
"summary": "CVE Nummern erg\u00e4nzt"
}
],
"status": "final",
"version": "7"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Sequoia \u003c15.1",
"product": {
"name": "Apple macOS Sequoia \u003c15.1",
"product_id": "T038638"
}
},
{
"category": "product_version",
"name": "Sequoia 15.1",
"product": {
"name": "Apple macOS Sequoia 15.1",
"product_id": "T038638-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:sequoia__15.1"
}
}
},
{
"category": "product_version_range",
"name": "Sonoma \u003c14.7.1",
"product": {
"name": "Apple macOS Sonoma \u003c14.7.1",
"product_id": "T038639"
}
},
{
"category": "product_version",
"name": "Sonoma 14.7.1",
"product": {
"name": "Apple macOS Sonoma 14.7.1",
"product_id": "T038639-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:sonoma__14.7.1"
}
}
},
{
"category": "product_version_range",
"name": "Ventura \u003c13.7.1",
"product": {
"name": "Apple macOS Ventura \u003c13.7.1",
"product_id": "T038640"
}
},
{
"category": "product_version",
"name": "Ventura 13.7.1",
"product": {
"name": "Apple macOS Ventura 13.7.1",
"product_id": "T038640-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:ventura__13.7.1"
}
}
}
],
"category": "product_name",
"name": "macOS"
}
],
"category": "vendor",
"name": "Apple"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-38476",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-38476"
},
{
"cve": "CVE-2024-38477",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-38477"
},
{
"cve": "CVE-2024-39573",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-39573"
},
{
"cve": "CVE-2024-40849",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-40849"
},
{
"cve": "CVE-2024-40854",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-40854"
},
{
"cve": "CVE-2024-40855",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-40855"
},
{
"cve": "CVE-2024-40858",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-40858"
},
{
"cve": "CVE-2024-44122",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44122"
},
{
"cve": "CVE-2024-44126",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44126"
},
{
"cve": "CVE-2024-44137",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44137"
},
{
"cve": "CVE-2024-44144",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44144"
},
{
"cve": "CVE-2024-44156",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44156"
},
{
"cve": "CVE-2024-44159",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44159"
},
{
"cve": "CVE-2024-44175",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44175"
},
{
"cve": "CVE-2024-44194",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44194"
},
{
"cve": "CVE-2024-44195",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44195"
},
{
"cve": "CVE-2024-44196",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44196"
},
{
"cve": "CVE-2024-44197",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44197"
},
{
"cve": "CVE-2024-44200",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44200"
},
{
"cve": "CVE-2024-44201",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44201"
},
{
"cve": "CVE-2024-44211",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44211"
},
{
"cve": "CVE-2024-44212",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44212"
},
{
"cve": "CVE-2024-44213",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44213"
},
{
"cve": "CVE-2024-44215",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44215"
},
{
"cve": "CVE-2024-44216",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44216"
},
{
"cve": "CVE-2024-44218",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44218"
},
{
"cve": "CVE-2024-44219",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44219"
},
{
"cve": "CVE-2024-44222",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44222"
},
{
"cve": "CVE-2024-44223",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44223"
},
{
"cve": "CVE-2024-44229",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44229"
},
{
"cve": "CVE-2024-44231",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44231"
},
{
"cve": "CVE-2024-44232",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44232"
},
{
"cve": "CVE-2024-44233",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44233"
},
{
"cve": "CVE-2024-44234",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44234"
},
{
"cve": "CVE-2024-44236",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44236"
},
{
"cve": "CVE-2024-44237",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44237"
},
{
"cve": "CVE-2024-44239",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44239"
},
{
"cve": "CVE-2024-44240",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44240"
},
{
"cve": "CVE-2024-44241",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44241"
},
{
"cve": "CVE-2024-44242",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44242"
},
{
"cve": "CVE-2024-44244",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44244"
},
{
"cve": "CVE-2024-44247",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44247"
},
{
"cve": "CVE-2024-44248",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44248"
},
{
"cve": "CVE-2024-44250",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44250"
},
{
"cve": "CVE-2024-44253",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44253"
},
{
"cve": "CVE-2024-44254",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44254"
},
{
"cve": "CVE-2024-44255",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44255"
},
{
"cve": "CVE-2024-44256",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44256"
},
{
"cve": "CVE-2024-44257",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44257"
},
{
"cve": "CVE-2024-44259",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44259"
},
{
"cve": "CVE-2024-44260",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44260"
},
{
"cve": "CVE-2024-44264",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44264"
},
{
"cve": "CVE-2024-44265",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44265"
},
{
"cve": "CVE-2024-44267",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44267"
},
{
"cve": "CVE-2024-44269",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44269"
},
{
"cve": "CVE-2024-44270",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44270"
},
{
"cve": "CVE-2024-44273",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44273"
},
{
"cve": "CVE-2024-44275",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44275"
},
{
"cve": "CVE-2024-44277",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44277"
},
{
"cve": "CVE-2024-44278",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44278"
},
{
"cve": "CVE-2024-44279",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44279"
},
{
"cve": "CVE-2024-44280",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44280"
},
{
"cve": "CVE-2024-44281",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44281"
},
{
"cve": "CVE-2024-44282",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44282"
},
{
"cve": "CVE-2024-44283",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44283"
},
{
"cve": "CVE-2024-44284",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44284"
},
{
"cve": "CVE-2024-44285",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44285"
},
{
"cve": "CVE-2024-44286",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44286"
},
{
"cve": "CVE-2024-44287",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44287"
},
{
"cve": "CVE-2024-44289",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44289"
},
{
"cve": "CVE-2024-44290",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44290"
},
{
"cve": "CVE-2024-44292",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44292"
},
{
"cve": "CVE-2024-44293",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44293"
},
{
"cve": "CVE-2024-44294",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44294"
},
{
"cve": "CVE-2024-44295",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44295"
},
{
"cve": "CVE-2024-44296",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44296"
},
{
"cve": "CVE-2024-44297",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44297"
},
{
"cve": "CVE-2024-44298",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44298"
},
{
"cve": "CVE-2024-44299",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44299"
},
{
"cve": "CVE-2024-44301",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44301"
},
{
"cve": "CVE-2024-44302",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44302"
},
{
"cve": "CVE-2024-44303",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44303"
},
{
"cve": "CVE-2024-54471",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-54471"
},
{
"cve": "CVE-2024-54535",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-54535"
},
{
"cve": "CVE-2024-54538",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-54538"
},
{
"cve": "CVE-2024-54554",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-54554"
}
]
}
FKIE_CVE-2024-44201
Vulnerability from fkie_nvd - Published: 2024-12-12 02:15 - Updated: 2025-11-03 22:18
Severity ?
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Summary
The issue was addressed with improved memory handling. This issue is fixed in iPadOS 17.7.3, macOS Ventura 13.7.2, iOS 18.1 and iPadOS 18.1, macOS Sonoma 14.7.2. Processing a malicious crafted file may lead to a denial-of-service.
References
| URL | Tags | ||
|---|---|---|---|
| product-security@apple.com | https://support.apple.com/en-us/121563 | Vendor Advisory | |
| product-security@apple.com | https://support.apple.com/en-us/121838 | Vendor Advisory | |
| product-security@apple.com | https://support.apple.com/en-us/121840 | Vendor Advisory | |
| product-security@apple.com | https://support.apple.com/en-us/121842 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2024/Dec/6 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2024/Dec/8 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2024/Dec/9 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"matchCriteriaId": "03B2CC01-9482-433A-A0D3-076683F4B012",
"versionEndExcluding": "17.7.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C1AEAF56-49F9-4F1F-993C-97ECD7BDA012",
"versionEndExcluding": "18.1",
"versionStartIncluding": "18.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B9A26654-0DDB-4D4D-BB1E-C65C3339148E",
"versionEndExcluding": "18.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "30D66414-3769-4793-A9BF-A39E8CAB31D3",
"versionEndExcluding": "13.7.2",
"versionStartIncluding": "13.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "617CA14A-5EA4-4112-A564-DB1A5109A066",
"versionEndExcluding": "14.7.2",
"versionStartIncluding": "14.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved memory handling. This issue is fixed in iPadOS 17.7.3, macOS Ventura 13.7.2, iOS 18.1 and iPadOS 18.1, macOS Sonoma 14.7.2. Processing a malicious crafted file may lead to a denial-of-service."
},
{
"lang": "es",
"value": "El problema se solucion\u00f3 mejorando el manejo de la memoria. Este problema se solucion\u00f3 en iPadOS 17.7.3, macOS Ventura 13.7.2, iOS 18.1 y iPadOS 18.1, macOS Sonoma 14.7.2. El procesamiento de un archivo manipulado con fines malintencionados puede provocar una denegaci\u00f3n de servicio."
}
],
"id": "CVE-2024-44201",
"lastModified": "2025-11-03T22:18:25.473",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-12-12T02:15:23.313",
"references": [
{
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/121563"
},
{
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/121838"
},
{
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/121840"
},
{
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/121842"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://seclists.org/fulldisclosure/2024/Dec/6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://seclists.org/fulldisclosure/2024/Dec/8"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://seclists.org/fulldisclosure/2024/Dec/9"
}
],
"sourceIdentifier": "product-security@apple.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-404"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
CERTFR-2024-AVI-1072
Vulnerability from certfr_avis - Published: 2024-12-12 - Updated: 2024-12-12
De multiples vulnérabilités ont été découvertes dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Impacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | iOS | iOS versions antérieures à 18.2 | ||
| Apple | watchOS | watchOS versions antérieures à 11.2 | ||
| Apple | macOS | macOS Sonoma versions antérieures à 14.7.2 | ||
| Apple | tvOS | tvOS versions antérieures à 18.2 | ||
| Apple | iPadOS | iPadOS versions antérieures à 18.2 | ||
| Apple | iPadOS | iPadOS versions antérieures à 17.7.3 | ||
| Apple | visionOS | visionOS versions antérieures à 2.2 | ||
| Apple | macOS | macOS Sequoia versions antérieures à 15.2 | ||
| Apple | Safari | Safari versions antérieures à 18.2 | ||
| Apple | macOS | macOS Ventura versions antérieures à 13.7.2 |
References
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "iOS\u00a0versions ant\u00e9rieures \u00e0 18.2",
"product": {
"name": "iOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "watchOS\u00a0versions ant\u00e9rieures \u00e0 11.2",
"product": {
"name": "watchOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS\u00a0Sonoma\u00a0versions ant\u00e9rieures \u00e0 14.7.2",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "tvOS\u00a0versions ant\u00e9rieures \u00e0 18.2",
"product": {
"name": "tvOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iPadOS\u00a0 versions ant\u00e9rieures \u00e0 18.2",
"product": {
"name": "iPadOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iPadOS\u00a0 versions ant\u00e9rieures \u00e0 17.7.3",
"product": {
"name": "iPadOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "visionOS\u00a0versions ant\u00e9rieures \u00e0 2.2",
"product": {
"name": "visionOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS\u00a0Sequoia\u00a0versions ant\u00e9rieures \u00e0 15.2",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Safari versions ant\u00e9rieures \u00e0 18.2",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS\u00a0Ventura\u00a0versions ant\u00e9rieures \u00e0 13.7.2",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-54513",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54513"
},
{
"name": "CVE-2024-54508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54508"
},
{
"name": "CVE-2024-54502",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54502"
},
{
"name": "CVE-2024-54515",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54515"
},
{
"name": "CVE-2024-44243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44243"
},
{
"name": "CVE-2024-54505",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54505"
},
{
"name": "CVE-2024-54529",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54529"
},
{
"name": "CVE-2024-54498",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54498"
},
{
"name": "CVE-2024-54479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54479"
},
{
"name": "CVE-2024-44224",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44224"
},
{
"name": "CVE-2024-54495",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54495"
},
{
"name": "CVE-2024-54514",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54514"
},
{
"name": "CVE-2024-54526",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54526"
},
{
"name": "CVE-2023-32395",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32395"
},
{
"name": "CVE-2024-54477",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54477"
},
{
"name": "CVE-2024-54506",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54506"
},
{
"name": "CVE-2024-54485",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54485"
},
{
"name": "CVE-2024-44225",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44225"
},
{
"name": "CVE-2024-54486",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54486"
},
{
"name": "CVE-2024-54490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54490"
},
{
"name": "CVE-2024-54489",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54489"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-54500",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54500"
},
{
"name": "CVE-2024-54465",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54465"
},
{
"name": "CVE-2024-54484",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54484"
},
{
"name": "CVE-2024-44248",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44248"
},
{
"name": "CVE-2024-54466",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54466"
},
{
"name": "CVE-2024-44246",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44246"
},
{
"name": "CVE-2024-54531",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54531"
},
{
"name": "CVE-2024-54493",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54493"
},
{
"name": "CVE-2024-54494",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54494"
},
{
"name": "CVE-2024-54476",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54476"
},
{
"name": "CVE-2024-54528",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54528"
},
{
"name": "CVE-2024-44220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44220"
},
{
"name": "CVE-2024-54503",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54503"
},
{
"name": "CVE-2024-44201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44201"
},
{
"name": "CVE-2024-44300",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44300"
},
{
"name": "CVE-2024-54491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54491"
},
{
"name": "CVE-2024-54510",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54510"
},
{
"name": "CVE-2024-54504",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54504"
},
{
"name": "CVE-2024-54474",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54474"
},
{
"name": "CVE-2024-44291",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44291"
},
{
"name": "CVE-2024-54534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
},
{
"name": "CVE-2024-54527",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54527"
},
{
"name": "CVE-2024-44245",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44245"
},
{
"name": "CVE-2024-54524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54524"
},
{
"name": "CVE-2024-54501",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54501"
},
{
"name": "CVE-2024-54492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54492"
}
],
"initial_release_date": "2024-12-12T00:00:00",
"last_revision_date": "2024-12-12T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-1072",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-12-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Apple. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": "2024-12-11",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 121845",
"url": "https://support.apple.com/en-us/121845"
},
{
"published_at": "2024-12-11",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 121837",
"url": "https://support.apple.com/en-us/121837"
},
{
"published_at": "2024-12-11",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 121840",
"url": "https://support.apple.com/en-us/121840"
},
{
"published_at": "2024-12-11",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 121846",
"url": "https://support.apple.com/en-us/121846"
},
{
"published_at": "2024-12-11",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 121839",
"url": "https://support.apple.com/en-us/121839"
},
{
"published_at": "2024-12-11",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 121838",
"url": "https://support.apple.com/en-us/121838"
},
{
"published_at": "2024-12-11",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 121842",
"url": "https://support.apple.com/en-us/121842"
},
{
"published_at": "2024-12-11",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 121843",
"url": "https://support.apple.com/en-us/121843"
},
{
"published_at": "2024-12-11",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 121844",
"url": "https://support.apple.com/en-us/121844"
}
]
}
GHSA-6VMF-4HPW-FGCM
Vulnerability from github – Published: 2024-12-12 03:33 – Updated: 2025-11-04 00:32
VLAI?
Details
The issue was addressed with improved memory handling. This issue is fixed in iPadOS 17.7.3, macOS Ventura 13.7.2, iOS 18.1 and iPadOS 18.1, macOS Sonoma 14.7.2. Processing a malicious crafted file may lead to a denial-of-service.
Severity ?
5.5 (Medium)
{
"affected": [],
"aliases": [
"CVE-2024-44201"
],
"database_specific": {
"cwe_ids": [
"CWE-404"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-12-12T02:15:23Z",
"severity": "MODERATE"
},
"details": "The issue was addressed with improved memory handling. This issue is fixed in iPadOS 17.7.3, macOS Ventura 13.7.2, iOS 18.1 and iPadOS 18.1, macOS Sonoma 14.7.2. Processing a malicious crafted file may lead to a denial-of-service.",
"id": "GHSA-6vmf-4hpw-fgcm",
"modified": "2025-11-04T00:32:10Z",
"published": "2024-12-12T03:33:06Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44201"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/121563"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/121838"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/121840"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/121842"
},
{
"type": "WEB",
"url": "http://seclists.org/fulldisclosure/2024/Dec/6"
},
{
"type": "WEB",
"url": "http://seclists.org/fulldisclosure/2024/Dec/8"
},
{
"type": "WEB",
"url": "http://seclists.org/fulldisclosure/2024/Dec/9"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…