CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
EPSS
Percentile
28.0%
The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.6.7, macOS Monterey 12.7.5, iOS 16.7.8 and iPadOS 16.7.8, tvOS 17.5, visionOS 1.2, iOS 17.5 and iPadOS 17.5, watchOS 10.5. An attacker that has already achieved kernel code execution may be able to bypass kernel memory protections.
Vendor | Product | Version | CPE |
---|---|---|---|
apple | ipados | * | cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* |
apple | iphone_os | * | cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* |
apple | macos | * | cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* |
apple | tvos | * | cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* |
apple | visionos | * | cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:* |
apple | watchos | * | cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* |
seclists.org/fulldisclosure/2024/Jun/5
support.apple.com/en-us/HT214100
support.apple.com/en-us/HT214101
support.apple.com/en-us/HT214102
support.apple.com/en-us/HT214104
support.apple.com/en-us/HT214105
support.apple.com/en-us/HT214107
support.apple.com/en-us/HT214108
support.apple.com/kb/HT214100
support.apple.com/kb/HT214101
support.apple.com/kb/HT214102
support.apple.com/kb/HT214104
support.apple.com/kb/HT214105
support.apple.com/kb/HT214107
support.apple.com/kb/HT214108