Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-44248 (GCVE-0-2024-44248)
Vulnerability from cvelistv5 – Published: 2024-12-11 22:58 – Updated: 2025-11-03 22:09
VLAI?
EPSS
Summary
This issue was addressed through improved state management. This issue is fixed in macOS Ventura 13.7.2, macOS Sonoma 14.7.2. A user with screen sharing access may be able to view another user's screen.
Severity ?
6.5 (Medium)
CWE
- A user with screen sharing access may be able to view another user's screen
Assigner
References
Impacted products
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-44248",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-16T18:48:59.335438Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-noinfo Not enough information",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-16T18:50:31.909Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2025-11-03T22:09:52.684Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "http://seclists.org/fulldisclosure/2024/Dec/9"
},
{
"url": "http://seclists.org/fulldisclosure/2024/Dec/8"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "macOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "13.7",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "macOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "14.7",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed through improved state management. This issue is fixed in macOS Ventura 13.7.2, macOS Sonoma 14.7.2. A user with screen sharing access may be able to view another user\u0027s screen."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "A user with screen sharing access may be able to view another user\u0027s screen",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T22:58:04.792Z",
"orgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"shortName": "apple"
},
"references": [
{
"url": "https://support.apple.com/en-us/121842"
},
{
"url": "https://support.apple.com/en-us/121840"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"assignerShortName": "apple",
"cveId": "CVE-2024-44248",
"datePublished": "2024-12-11T22:58:04.792Z",
"dateReserved": "2024-08-20T21:45:40.785Z",
"dateUpdated": "2025-11-03T22:09:52.684Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2024-44248\",\"sourceIdentifier\":\"product-security@apple.com\",\"published\":\"2024-12-12T02:15:24.280\",\"lastModified\":\"2025-11-03T22:18:30.710\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"This issue was addressed through improved state management. This issue is fixed in macOS Ventura 13.7.2, macOS Sonoma 14.7.2. A user with screen sharing access may be able to view another user\u0027s screen.\"},{\"lang\":\"es\",\"value\":\" Este problema se solucion\u00f3 mediante una mejor gesti\u00f3n de estados. Este problema se solucion\u00f3 en macOS Ventura 13.7.2 y macOS Sonoma 14.7.2. Un usuario con acceso para compartir pantalla puede ver la pantalla de otro usuario.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0\",\"versionEndExcluding\":\"13.7.2\",\"matchCriteriaId\":\"30D66414-3769-4793-A9BF-A39E8CAB31D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.0\",\"versionEndExcluding\":\"14.7.2\",\"matchCriteriaId\":\"617CA14A-5EA4-4112-A564-DB1A5109A066\"}]}]}],\"references\":[{\"url\":\"https://support.apple.com/en-us/121840\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/121842\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2024/Dec/8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://seclists.org/fulldisclosure/2024/Dec/9\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-44248\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-12-16T18:48:59.335438Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"description\": \"CWE-noinfo Not enough information\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-12-16T18:50:24.272Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"Apple\", \"product\": \"macOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"13.7\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"macOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"14.7\", \"versionType\": \"custom\"}]}], \"references\": [{\"url\": \"https://support.apple.com/en-us/121842\"}, {\"url\": \"https://support.apple.com/en-us/121840\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"This issue was addressed through improved state management. This issue is fixed in macOS Ventura 13.7.2, macOS Sonoma 14.7.2. A user with screen sharing access may be able to view another user\u0027s screen.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"A user with screen sharing access may be able to view another user\u0027s screen\"}]}], \"providerMetadata\": {\"orgId\": \"286789f9-fbc2-4510-9f9a-43facdede74c\", \"shortName\": \"apple\", \"dateUpdated\": \"2024-12-11T22:58:04.792Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-44248\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-16T18:50:31.909Z\", \"dateReserved\": \"2024-08-20T21:45:40.785Z\", \"assignerOrgId\": \"286789f9-fbc2-4510-9f9a-43facdede74c\", \"datePublished\": \"2024-12-11T22:58:04.792Z\", \"assignerShortName\": \"apple\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
WID-SEC-W-2024-3692
Vulnerability from csaf_certbund - Published: 2024-12-11 23:00 - Updated: 2025-08-31 22:00Summary
Apple macOS: Mehrere Schwachstellen
Severity
Hoch
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.
Angriff: Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsmaßnahmen zu umgehen oder einen Man-in-the-Middle-Angriff durchzuführen.
Betroffene Betriebssysteme: - MacOS X
References
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen oder einen Man-in-the-Middle-Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- MacOS X",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-3692 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3692.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-3692 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3692"
},
{
"category": "external",
"summary": "Apple Security Announce vom 2024-12-11",
"url": "https://lists.apple.com/archives/security-announce/2024/Dec/msg00002.html"
},
{
"category": "external",
"summary": "Apple Security Announce vom 2024-12-11",
"url": "https://lists.apple.com/archives/security-announce/2024/Dec/msg00003.html"
},
{
"category": "external",
"summary": "Apple Security Announce vom 2024-12-11",
"url": "https://lists.apple.com/archives/security-announce/2024/Dec/msg00004.html"
},
{
"category": "external",
"summary": "Mickey\u0027s Blogs vom 2025-01-08",
"url": "https://jhftss.github.io/CVE-2024-54527-MediaLibraryService-Full-TCC-Bypass/"
},
{
"category": "external",
"summary": "Cyber Security News vom 2025-01-12",
"url": "https://cybersecuritynews.com/macos-sandbox-vulnerability-cve-2024-54498-poc-exploit-released/"
},
{
"category": "external",
"summary": "PoC auf GitHub vom 2025-01-12",
"url": "https://github.com/koreacsl/SysBumps"
}
],
"source_lang": "en-US",
"title": "Apple macOS: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-08-31T22:00:00.000+00:00",
"generator": {
"date": "2025-09-01T07:26:22.133+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2024-3692",
"initial_release_date": "2024-12-11T23:00:00.000+00:00",
"revision_history": [
{
"date": "2024-12-11T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-01-08T23:00:00.000+00:00",
"number": "2",
"summary": "PoC aufgenommen"
},
{
"date": "2025-01-12T23:00:00.000+00:00",
"number": "3",
"summary": "weiterer PoC aufgenommen"
},
{
"date": "2025-02-12T23:00:00.000+00:00",
"number": "4",
"summary": "weiteren PoC aufgenommen"
},
{
"date": "2025-03-17T23:00:00.000+00:00",
"number": "5",
"summary": "CVE\u0027s erg\u00e4nzt"
},
{
"date": "2025-03-24T23:00:00.000+00:00",
"number": "6",
"summary": "CVE-Nummern erg\u00e4nzt"
},
{
"date": "2025-08-28T22:00:00.000+00:00",
"number": "7",
"summary": "CVE-2024-44271, CVE-2024-54568 aufgenommen"
},
{
"date": "2025-08-31T22:00:00.000+00:00",
"number": "8",
"summary": "Referenz(en) aufgenommen: EUVD-2024-54931"
}
],
"status": "final",
"version": "8"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c15.2",
"product": {
"name": "Apple macOS \u003c15.2",
"product_id": "T039820"
}
},
{
"category": "product_version",
"name": "15.2",
"product": {
"name": "Apple macOS 15.2",
"product_id": "T039820-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:15.2"
}
}
},
{
"category": "product_version_range",
"name": "\u003c14.7.2",
"product": {
"name": "Apple macOS \u003c14.7.2",
"product_id": "T039821"
}
},
{
"category": "product_version",
"name": "14.7.2",
"product": {
"name": "Apple macOS 14.7.2",
"product_id": "T039821-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:14.7.2"
}
}
},
{
"category": "product_version_range",
"name": "\u003c13.7.2",
"product": {
"name": "Apple macOS \u003c13.7.2",
"product_id": "T039822"
}
},
{
"category": "product_version",
"name": "13.7.2",
"product": {
"name": "Apple macOS 13.7.2",
"product_id": "T039822-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:13.7.2"
}
}
}
],
"category": "product_name",
"name": "macOS"
}
],
"category": "vendor",
"name": "Apple"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-32395",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2023-32395"
},
{
"cve": "CVE-2024-44201",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-44201"
},
{
"cve": "CVE-2024-44220",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-44220"
},
{
"cve": "CVE-2024-44224",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-44224"
},
{
"cve": "CVE-2024-44225",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-44225"
},
{
"cve": "CVE-2024-44243",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-44243"
},
{
"cve": "CVE-2024-44245",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-44245"
},
{
"cve": "CVE-2024-44246",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-44246"
},
{
"cve": "CVE-2024-44248",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-44248"
},
{
"cve": "CVE-2024-44271",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-44271"
},
{
"cve": "CVE-2024-44291",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-44291"
},
{
"cve": "CVE-2024-44300",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-44300"
},
{
"cve": "CVE-2024-45490",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-45490"
},
{
"cve": "CVE-2024-54465",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54465"
},
{
"cve": "CVE-2024-54466",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54466"
},
{
"cve": "CVE-2024-54468",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54468"
},
{
"cve": "CVE-2024-54474",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54474"
},
{
"cve": "CVE-2024-54475",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54475"
},
{
"cve": "CVE-2024-54476",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54476"
},
{
"cve": "CVE-2024-54477",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54477"
},
{
"cve": "CVE-2024-54479",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54479"
},
{
"cve": "CVE-2024-54484",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54484"
},
{
"cve": "CVE-2024-54486",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54486"
},
{
"cve": "CVE-2024-54488",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54488"
},
{
"cve": "CVE-2024-54489",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54489"
},
{
"cve": "CVE-2024-54490",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54490"
},
{
"cve": "CVE-2024-54491",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54491"
},
{
"cve": "CVE-2024-54492",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54492"
},
{
"cve": "CVE-2024-54493",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54493"
},
{
"cve": "CVE-2024-54494",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54494"
},
{
"cve": "CVE-2024-54495",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54495"
},
{
"cve": "CVE-2024-54498",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54498"
},
{
"cve": "CVE-2024-54499",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54499"
},
{
"cve": "CVE-2024-54500",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54500"
},
{
"cve": "CVE-2024-54501",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54501"
},
{
"cve": "CVE-2024-54502",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54502"
},
{
"cve": "CVE-2024-54504",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54504"
},
{
"cve": "CVE-2024-54505",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54505"
},
{
"cve": "CVE-2024-54506",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54506"
},
{
"cve": "CVE-2024-54507",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54507"
},
{
"cve": "CVE-2024-54508",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54508"
},
{
"cve": "CVE-2024-54510",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54510"
},
{
"cve": "CVE-2024-54513",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54513"
},
{
"cve": "CVE-2024-54514",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54514"
},
{
"cve": "CVE-2024-54515",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54515"
},
{
"cve": "CVE-2024-54516",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54516"
},
{
"cve": "CVE-2024-54517",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54517"
},
{
"cve": "CVE-2024-54518",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54518"
},
{
"cve": "CVE-2024-54519",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54519"
},
{
"cve": "CVE-2024-54520",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54520"
},
{
"cve": "CVE-2024-54522",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54522"
},
{
"cve": "CVE-2024-54523",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54523"
},
{
"cve": "CVE-2024-54524",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54524"
},
{
"cve": "CVE-2024-54525",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54525"
},
{
"cve": "CVE-2024-54526",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54526"
},
{
"cve": "CVE-2024-54527",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54527"
},
{
"cve": "CVE-2024-54528",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54528"
},
{
"cve": "CVE-2024-54529",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54529"
},
{
"cve": "CVE-2024-54530",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54530"
},
{
"cve": "CVE-2024-54531",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54531"
},
{
"cve": "CVE-2024-54534",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54534"
},
{
"cve": "CVE-2024-54536",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54536"
},
{
"cve": "CVE-2024-54537",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54537"
},
{
"cve": "CVE-2024-54539",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54539"
},
{
"cve": "CVE-2024-54541",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54541"
},
{
"cve": "CVE-2024-54542",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54542"
},
{
"cve": "CVE-2024-54547",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54547"
},
{
"cve": "CVE-2024-54549",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54549"
},
{
"cve": "CVE-2024-54550",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54550"
},
{
"cve": "CVE-2024-54557",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54557"
},
{
"cve": "CVE-2024-54559",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54559"
},
{
"cve": "CVE-2024-54565",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54565"
},
{
"cve": "CVE-2024-54568",
"product_status": {
"known_affected": [
"T039821",
"T039820",
"T039822"
]
},
"release_date": "2024-12-11T23:00:00.000+00:00",
"title": "CVE-2024-54568"
}
]
}
WID-SEC-W-2024-3291
Vulnerability from csaf_certbund - Published: 2024-10-28 23:00 - Updated: 2025-09-15 22:00Summary
Apple macOS: Mehrere Schwachstellen
Severity
Mittel
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.
Angriff: Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme: - MacOS X
References
| URL | Category | |
|---|---|---|
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- MacOS X",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-3291 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3291.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-3291 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3291"
},
{
"category": "external",
"summary": "Apple Security Advisory vom 2024-10-28",
"url": "https://lists.apple.com/archives/security-announce/2024/Oct/msg00003.html"
},
{
"category": "external",
"summary": "Apple Security Advisory vom 2024-10-28",
"url": "https://lists.apple.com/archives/security-announce/2024/Oct/msg00004.html"
},
{
"category": "external",
"summary": "Apple Security Advisory vom 2024-10-28",
"url": "https://lists.apple.com/archives/security-announce/2024/Oct/msg00005.html"
}
],
"source_lang": "en-US",
"title": "Apple macOS: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-09-15T22:00:00.000+00:00",
"generator": {
"date": "2025-09-16T05:26:10.681+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2024-3291",
"initial_release_date": "2024-10-28T23:00:00.000+00:00",
"revision_history": [
{
"date": "2024-10-28T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-11-19T23:00:00.000+00:00",
"number": "2",
"summary": "CVE Nummern erg\u00e4nzt"
},
{
"date": "2024-12-11T23:00:00.000+00:00",
"number": "3",
"summary": "CVE Nummern erg\u00e4nzt"
},
{
"date": "2024-12-19T23:00:00.000+00:00",
"number": "4",
"summary": "CVE-2024-54538 erg\u00e4nzt"
},
{
"date": "2025-08-28T22:00:00.000+00:00",
"number": "5",
"summary": "CVE-2024-54554 erg\u00e4nzt"
},
{
"date": "2025-08-31T22:00:00.000+00:00",
"number": "6",
"summary": "Referenz(en) aufgenommen: EUVD-2024-54932"
},
{
"date": "2025-09-15T22:00:00.000+00:00",
"number": "7",
"summary": "CVE Nummern erg\u00e4nzt"
}
],
"status": "final",
"version": "7"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Sequoia \u003c15.1",
"product": {
"name": "Apple macOS Sequoia \u003c15.1",
"product_id": "T038638"
}
},
{
"category": "product_version",
"name": "Sequoia 15.1",
"product": {
"name": "Apple macOS Sequoia 15.1",
"product_id": "T038638-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:sequoia__15.1"
}
}
},
{
"category": "product_version_range",
"name": "Sonoma \u003c14.7.1",
"product": {
"name": "Apple macOS Sonoma \u003c14.7.1",
"product_id": "T038639"
}
},
{
"category": "product_version",
"name": "Sonoma 14.7.1",
"product": {
"name": "Apple macOS Sonoma 14.7.1",
"product_id": "T038639-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:sonoma__14.7.1"
}
}
},
{
"category": "product_version_range",
"name": "Ventura \u003c13.7.1",
"product": {
"name": "Apple macOS Ventura \u003c13.7.1",
"product_id": "T038640"
}
},
{
"category": "product_version",
"name": "Ventura 13.7.1",
"product": {
"name": "Apple macOS Ventura 13.7.1",
"product_id": "T038640-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:ventura__13.7.1"
}
}
}
],
"category": "product_name",
"name": "macOS"
}
],
"category": "vendor",
"name": "Apple"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-38476",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-38476"
},
{
"cve": "CVE-2024-38477",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-38477"
},
{
"cve": "CVE-2024-39573",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-39573"
},
{
"cve": "CVE-2024-40849",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-40849"
},
{
"cve": "CVE-2024-40854",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-40854"
},
{
"cve": "CVE-2024-40855",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-40855"
},
{
"cve": "CVE-2024-40858",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-40858"
},
{
"cve": "CVE-2024-44122",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44122"
},
{
"cve": "CVE-2024-44126",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44126"
},
{
"cve": "CVE-2024-44137",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44137"
},
{
"cve": "CVE-2024-44144",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44144"
},
{
"cve": "CVE-2024-44156",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44156"
},
{
"cve": "CVE-2024-44159",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44159"
},
{
"cve": "CVE-2024-44175",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44175"
},
{
"cve": "CVE-2024-44194",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44194"
},
{
"cve": "CVE-2024-44195",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44195"
},
{
"cve": "CVE-2024-44196",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44196"
},
{
"cve": "CVE-2024-44197",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44197"
},
{
"cve": "CVE-2024-44200",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44200"
},
{
"cve": "CVE-2024-44201",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44201"
},
{
"cve": "CVE-2024-44211",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44211"
},
{
"cve": "CVE-2024-44212",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44212"
},
{
"cve": "CVE-2024-44213",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44213"
},
{
"cve": "CVE-2024-44215",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44215"
},
{
"cve": "CVE-2024-44216",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44216"
},
{
"cve": "CVE-2024-44218",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44218"
},
{
"cve": "CVE-2024-44219",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44219"
},
{
"cve": "CVE-2024-44222",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44222"
},
{
"cve": "CVE-2024-44223",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44223"
},
{
"cve": "CVE-2024-44229",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44229"
},
{
"cve": "CVE-2024-44231",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44231"
},
{
"cve": "CVE-2024-44232",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44232"
},
{
"cve": "CVE-2024-44233",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44233"
},
{
"cve": "CVE-2024-44234",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44234"
},
{
"cve": "CVE-2024-44236",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44236"
},
{
"cve": "CVE-2024-44237",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44237"
},
{
"cve": "CVE-2024-44239",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44239"
},
{
"cve": "CVE-2024-44240",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44240"
},
{
"cve": "CVE-2024-44241",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44241"
},
{
"cve": "CVE-2024-44242",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44242"
},
{
"cve": "CVE-2024-44244",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44244"
},
{
"cve": "CVE-2024-44247",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44247"
},
{
"cve": "CVE-2024-44248",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44248"
},
{
"cve": "CVE-2024-44250",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44250"
},
{
"cve": "CVE-2024-44253",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44253"
},
{
"cve": "CVE-2024-44254",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44254"
},
{
"cve": "CVE-2024-44255",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44255"
},
{
"cve": "CVE-2024-44256",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44256"
},
{
"cve": "CVE-2024-44257",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44257"
},
{
"cve": "CVE-2024-44259",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44259"
},
{
"cve": "CVE-2024-44260",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44260"
},
{
"cve": "CVE-2024-44264",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44264"
},
{
"cve": "CVE-2024-44265",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44265"
},
{
"cve": "CVE-2024-44267",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44267"
},
{
"cve": "CVE-2024-44269",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44269"
},
{
"cve": "CVE-2024-44270",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44270"
},
{
"cve": "CVE-2024-44273",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44273"
},
{
"cve": "CVE-2024-44275",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44275"
},
{
"cve": "CVE-2024-44277",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44277"
},
{
"cve": "CVE-2024-44278",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44278"
},
{
"cve": "CVE-2024-44279",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44279"
},
{
"cve": "CVE-2024-44280",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44280"
},
{
"cve": "CVE-2024-44281",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44281"
},
{
"cve": "CVE-2024-44282",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44282"
},
{
"cve": "CVE-2024-44283",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44283"
},
{
"cve": "CVE-2024-44284",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44284"
},
{
"cve": "CVE-2024-44285",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44285"
},
{
"cve": "CVE-2024-44286",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44286"
},
{
"cve": "CVE-2024-44287",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44287"
},
{
"cve": "CVE-2024-44289",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44289"
},
{
"cve": "CVE-2024-44290",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44290"
},
{
"cve": "CVE-2024-44292",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44292"
},
{
"cve": "CVE-2024-44293",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44293"
},
{
"cve": "CVE-2024-44294",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44294"
},
{
"cve": "CVE-2024-44295",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44295"
},
{
"cve": "CVE-2024-44296",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44296"
},
{
"cve": "CVE-2024-44297",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44297"
},
{
"cve": "CVE-2024-44298",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44298"
},
{
"cve": "CVE-2024-44299",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44299"
},
{
"cve": "CVE-2024-44301",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44301"
},
{
"cve": "CVE-2024-44302",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44302"
},
{
"cve": "CVE-2024-44303",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-44303"
},
{
"cve": "CVE-2024-54471",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-54471"
},
{
"cve": "CVE-2024-54535",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-54535"
},
{
"cve": "CVE-2024-54538",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-54538"
},
{
"cve": "CVE-2024-54554",
"product_status": {
"known_affected": [
"T038639",
"T038638",
"T038640"
]
},
"release_date": "2024-10-28T23:00:00.000+00:00",
"title": "CVE-2024-54554"
}
]
}
CERTFR-2024-AVI-1072
Vulnerability from certfr_avis - Published: 2024-12-12 - Updated: 2024-12-12
De multiples vulnérabilités ont été découvertes dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Impacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | iOS | iOS versions antérieures à 18.2 | ||
| Apple | watchOS | watchOS versions antérieures à 11.2 | ||
| Apple | macOS | macOS Sonoma versions antérieures à 14.7.2 | ||
| Apple | tvOS | tvOS versions antérieures à 18.2 | ||
| Apple | iPadOS | iPadOS versions antérieures à 18.2 | ||
| Apple | iPadOS | iPadOS versions antérieures à 17.7.3 | ||
| Apple | visionOS | visionOS versions antérieures à 2.2 | ||
| Apple | macOS | macOS Sequoia versions antérieures à 15.2 | ||
| Apple | Safari | Safari versions antérieures à 18.2 | ||
| Apple | macOS | macOS Ventura versions antérieures à 13.7.2 |
References
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "iOS\u00a0versions ant\u00e9rieures \u00e0 18.2",
"product": {
"name": "iOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "watchOS\u00a0versions ant\u00e9rieures \u00e0 11.2",
"product": {
"name": "watchOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS\u00a0Sonoma\u00a0versions ant\u00e9rieures \u00e0 14.7.2",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "tvOS\u00a0versions ant\u00e9rieures \u00e0 18.2",
"product": {
"name": "tvOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iPadOS\u00a0 versions ant\u00e9rieures \u00e0 18.2",
"product": {
"name": "iPadOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iPadOS\u00a0 versions ant\u00e9rieures \u00e0 17.7.3",
"product": {
"name": "iPadOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "visionOS\u00a0versions ant\u00e9rieures \u00e0 2.2",
"product": {
"name": "visionOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS\u00a0Sequoia\u00a0versions ant\u00e9rieures \u00e0 15.2",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Safari versions ant\u00e9rieures \u00e0 18.2",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS\u00a0Ventura\u00a0versions ant\u00e9rieures \u00e0 13.7.2",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-54513",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54513"
},
{
"name": "CVE-2024-54508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54508"
},
{
"name": "CVE-2024-54502",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54502"
},
{
"name": "CVE-2024-54515",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54515"
},
{
"name": "CVE-2024-44243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44243"
},
{
"name": "CVE-2024-54505",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54505"
},
{
"name": "CVE-2024-54529",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54529"
},
{
"name": "CVE-2024-54498",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54498"
},
{
"name": "CVE-2024-54479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54479"
},
{
"name": "CVE-2024-44224",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44224"
},
{
"name": "CVE-2024-54495",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54495"
},
{
"name": "CVE-2024-54514",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54514"
},
{
"name": "CVE-2024-54526",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54526"
},
{
"name": "CVE-2023-32395",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32395"
},
{
"name": "CVE-2024-54477",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54477"
},
{
"name": "CVE-2024-54506",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54506"
},
{
"name": "CVE-2024-54485",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54485"
},
{
"name": "CVE-2024-44225",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44225"
},
{
"name": "CVE-2024-54486",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54486"
},
{
"name": "CVE-2024-54490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54490"
},
{
"name": "CVE-2024-54489",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54489"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-54500",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54500"
},
{
"name": "CVE-2024-54465",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54465"
},
{
"name": "CVE-2024-54484",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54484"
},
{
"name": "CVE-2024-44248",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44248"
},
{
"name": "CVE-2024-54466",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54466"
},
{
"name": "CVE-2024-44246",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44246"
},
{
"name": "CVE-2024-54531",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54531"
},
{
"name": "CVE-2024-54493",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54493"
},
{
"name": "CVE-2024-54494",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54494"
},
{
"name": "CVE-2024-54476",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54476"
},
{
"name": "CVE-2024-54528",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54528"
},
{
"name": "CVE-2024-44220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44220"
},
{
"name": "CVE-2024-54503",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54503"
},
{
"name": "CVE-2024-44201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44201"
},
{
"name": "CVE-2024-44300",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44300"
},
{
"name": "CVE-2024-54491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54491"
},
{
"name": "CVE-2024-54510",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54510"
},
{
"name": "CVE-2024-54504",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54504"
},
{
"name": "CVE-2024-54474",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54474"
},
{
"name": "CVE-2024-44291",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44291"
},
{
"name": "CVE-2024-54534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
},
{
"name": "CVE-2024-54527",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54527"
},
{
"name": "CVE-2024-44245",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44245"
},
{
"name": "CVE-2024-54524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54524"
},
{
"name": "CVE-2024-54501",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54501"
},
{
"name": "CVE-2024-54492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54492"
}
],
"initial_release_date": "2024-12-12T00:00:00",
"last_revision_date": "2024-12-12T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-1072",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-12-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Apple. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": "2024-12-11",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 121845",
"url": "https://support.apple.com/en-us/121845"
},
{
"published_at": "2024-12-11",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 121837",
"url": "https://support.apple.com/en-us/121837"
},
{
"published_at": "2024-12-11",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 121840",
"url": "https://support.apple.com/en-us/121840"
},
{
"published_at": "2024-12-11",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 121846",
"url": "https://support.apple.com/en-us/121846"
},
{
"published_at": "2024-12-11",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 121839",
"url": "https://support.apple.com/en-us/121839"
},
{
"published_at": "2024-12-11",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 121838",
"url": "https://support.apple.com/en-us/121838"
},
{
"published_at": "2024-12-11",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 121842",
"url": "https://support.apple.com/en-us/121842"
},
{
"published_at": "2024-12-11",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 121843",
"url": "https://support.apple.com/en-us/121843"
},
{
"published_at": "2024-12-11",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 121844",
"url": "https://support.apple.com/en-us/121844"
}
]
}
FKIE_CVE-2024-44248
Vulnerability from fkie_nvd - Published: 2024-12-12 02:15 - Updated: 2025-11-03 22:18
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
This issue was addressed through improved state management. This issue is fixed in macOS Ventura 13.7.2, macOS Sonoma 14.7.2. A user with screen sharing access may be able to view another user's screen.
References
| URL | Tags | ||
|---|---|---|---|
| product-security@apple.com | https://support.apple.com/en-us/121840 | Vendor Advisory | |
| product-security@apple.com | https://support.apple.com/en-us/121842 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2024/Dec/8 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2024/Dec/9 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "30D66414-3769-4793-A9BF-A39E8CAB31D3",
"versionEndExcluding": "13.7.2",
"versionStartIncluding": "13.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "617CA14A-5EA4-4112-A564-DB1A5109A066",
"versionEndExcluding": "14.7.2",
"versionStartIncluding": "14.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed through improved state management. This issue is fixed in macOS Ventura 13.7.2, macOS Sonoma 14.7.2. A user with screen sharing access may be able to view another user\u0027s screen."
},
{
"lang": "es",
"value": " Este problema se solucion\u00f3 mediante una mejor gesti\u00f3n de estados. Este problema se solucion\u00f3 en macOS Ventura 13.7.2 y macOS Sonoma 14.7.2. Un usuario con acceso para compartir pantalla puede ver la pantalla de otro usuario."
}
],
"id": "CVE-2024-44248",
"lastModified": "2025-11-03T22:18:30.710",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-12-12T02:15:24.280",
"references": [
{
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/121840"
},
{
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/121842"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://seclists.org/fulldisclosure/2024/Dec/8"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://seclists.org/fulldisclosure/2024/Dec/9"
}
],
"sourceIdentifier": "product-security@apple.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-HWMM-RQF4-5HQH
Vulnerability from github – Published: 2024-12-12 03:33 – Updated: 2025-11-04 00:32
VLAI?
Details
This issue was addressed through improved state management. This issue is fixed in macOS Ventura 13.7.2, macOS Sonoma 14.7.2. A user with screen sharing access may be able to view another user's screen.
Severity ?
6.5 (Medium)
{
"affected": [],
"aliases": [
"CVE-2024-44248"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-12-12T02:15:24Z",
"severity": "MODERATE"
},
"details": "This issue was addressed through improved state management. This issue is fixed in macOS Ventura 13.7.2, macOS Sonoma 14.7.2. A user with screen sharing access may be able to view another user\u0027s screen.",
"id": "GHSA-hwmm-rqf4-5hqh",
"modified": "2025-11-04T00:32:11Z",
"published": "2024-12-12T03:33:06Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44248"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/121840"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/121842"
},
{
"type": "WEB",
"url": "http://seclists.org/fulldisclosure/2024/Dec/8"
},
{
"type": "WEB",
"url": "http://seclists.org/fulldisclosure/2024/Dec/9"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…