First published: Mon Mar 25 2019(Updated: )
A logic issue was addressed with improved state management. This issue is fixed in iOS 12.2, macOS Mojave 10.14.4, tvOS 12.2, watchOS 5.2. An application may be able to gain elevated privileges.
Credit: Samuel Groß Google Project ZeroSamuel Groß Google Project ZeroSamuel Groß Google Project ZeroSamuel Groß Google Project Zero product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS | <12.2 | 12.2 |
Apple macOS Mojave | <10.14.4 | 10.14.4 |
Apple High Sierra | ||
Apple Sierra | ||
Apple tvOS | <12.2 | 12.2 |
Apple watchOS | <5.2 | 5.2 |
Apple iPhone OS | <12.2 | |
Apple Mac OS X | <10.14.4 | |
Apple tvOS | <12.2 | |
Apple watchOS | <5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The severity of CVE-2019-8514 is high with a severity score of 7.8.
The Apple products affected by CVE-2019-8514 include iOS (up to version 12.2), macOS Mojave (up to version 10.14.4), tvOS (up to version 12.2), and watchOS (up to version 5.2).
An application can gain elevated privileges by exploiting the logic issue addressed in CVE-2019-8514.
To fix CVE-2019-8514, update your iOS device to version 12.2, macOS Mojave to version 10.14.4, tvOS to version 12.2, and watchOS to version 5.2.
You can find more information about CVE-2019-8514 on Apple's official support page: [https://support.apple.com/HT209599](https://support.apple.com/HT209599).