CVE-2024-27840

The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.6.7, macOS Monterey 12.7.5, iOS 16.7.8 and iPadOS 16.7.8, tvOS 17.5, visionOS 1.2, iOS 17.5 and iPadOS 17.5, watchOS 10.5. An attacker that has already achieved kernel code execution may be able to bypass kernel memory protections.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

History

03 Jul 2024, 16:27

Type Values Removed Values Added
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.3
CPE cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
References () https://support.apple.com/kb/HT214107 - () https://support.apple.com/kb/HT214107 - Vendor Advisory
References () https://support.apple.com/en-us/HT214105 - () https://support.apple.com/en-us/HT214105 - Vendor Advisory
References () https://support.apple.com/en-us/HT214108 - () https://support.apple.com/en-us/HT214108 - Vendor Advisory
References () https://support.apple.com/en-us/HT214104 - () https://support.apple.com/en-us/HT214104 - Vendor Advisory
References () https://support.apple.com/en-us/HT214101 - () https://support.apple.com/en-us/HT214101 - Vendor Advisory
References () https://support.apple.com/kb/HT214102 - () https://support.apple.com/kb/HT214102 - Vendor Advisory
References () https://support.apple.com/en-us/HT214107 - () https://support.apple.com/en-us/HT214107 - Vendor Advisory
References () http://seclists.org/fulldisclosure/2024/Jun/5 - () http://seclists.org/fulldisclosure/2024/Jun/5 - Mailing List, Third Party Advisory
References () https://support.apple.com/kb/HT214108 - () https://support.apple.com/kb/HT214108 - Vendor Advisory
References () https://support.apple.com/kb/HT214101 - () https://support.apple.com/kb/HT214101 - Vendor Advisory
References () https://support.apple.com/kb/HT214104 - () https://support.apple.com/kb/HT214104 - Vendor Advisory
References () https://support.apple.com/en-us/HT214102 - () https://support.apple.com/en-us/HT214102 - Vendor Advisory
References () https://support.apple.com/en-us/HT214100 - () https://support.apple.com/en-us/HT214100 - Vendor Advisory
References () https://support.apple.com/kb/HT214100 - () https://support.apple.com/kb/HT214100 - Vendor Advisory
References () https://support.apple.com/kb/HT214105 - () https://support.apple.com/kb/HT214105 - Vendor Advisory
First Time Apple iphone Os
Apple
Apple ipados
Apple macos
Apple visionos
Apple tvos
Apple watchos

12 Jun 2024, 04:15

Type Values Removed Values Added
References
  • () http://seclists.org/fulldisclosure/2024/Jun/5 -

11 Jun 2024, 08:15

Type Values Removed Values Added
References
  • () https://support.apple.com/kb/HT214107 -
  • () https://support.apple.com/kb/HT214102 -
  • () https://support.apple.com/kb/HT214101 -
  • () https://support.apple.com/kb/HT214104 -
  • () https://support.apple.com/kb/HT214100 -
  • () https://support.apple.com/kb/HT214105 -

10 Jun 2024, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-10 21:15

Updated : 2024-07-03 16:27


NVD link : CVE-2024-27840

Mitre link : CVE-2024-27840


JSON object : View

Products Affected

apple

  • tvos
  • watchos
  • ipados
  • macos
  • visionos
  • iphone_os