First published: Thu Mar 07 2024(Updated: )
Accessibility. A privacy issue was addressed with improved private data redaction for log entries.
Credit: Mickey Jin @patch1t product-security@apple.com m4yfly with TianGong Team Legendsec at Qi'anxin GroupClemens Lang an anonymous researcher Csaba Fitzl @theevilbit OffSecJunsung Lee Trend Micro Zero Day InitiativeAmir Bazine CrowdStrike Counter Adversary OperationsKarsten König CrowdStrike Counter Adversary OperationsDohyun Lee @l33d0hyun Lyutoon Mr.R Murray Mike Pedro Tôrres @t0rr3sp3dr0 Xinru Chi Pangu LabCVE-2024-23225 Koh M. Nakagawa FFRI Security IncMeng Zhang (鲸落) NorthSeaMeysam Firouzi @R00tkitsmm Trend Micro Zero Day InitiativeCVE-2024-23283 Bohdan Stasiuk @Bohdan_Stasiuk Jubaer Alnazi @h33tjubaer Csaba Fitzl @theevilbit Offensive SecurityJoshua Jewett @JoshJewett33 Kirin @Pwnrin Brian McNulty CVE-2024-23235 koocola ali yabuz @08Tc3wBB JamfCVE-2023-48795 CVE-2023-51384 CVE-2023-51385 Harsh Tyagi Wojciech Regula SecuRingCVE-2024-23296 Lyra Rebane (rebane2001) Matej Rabzelj CVE-2024-23238 Yiğit Can YILMAZ @yilmazcanyigit luckyu @uuulucky K宝 Fudan UniversityLFY @secsys Fudan UniversityLewis Hardy Bistrit Dahal CVE-2024-23241 CVE-2024-23242 Matthew Loewen Deutsche Telekom Security GmbH sponsored by Bundesamt für Sicherheit in der Informationstechnik Pwn2car James Lee @Windowsrcer Johan Carlsson (joaxcar) Georg Felber Marco Squarcina Guilherme Rambo Best Buddy AppsCVE-2024-23205 CVE-2022-48554 Zhenjiang Zhao pangu teamQianxin CrowdStrike Counter Adversary Operations CrowdStrike Counter Adversary OperationsMarc Newlin SkySafeStephan Casas CVE-2024-23291
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS Monterey | <12.7.4 | 12.7.4 |
Apple macOS | >=12.0<12.7.4 | |
Apple macOS | >=13.0<13.6.5 | |
Apple macOS | >=14.0<14.4 | |
Apple macOS | <14.4 | 14.4 |
Apple macOS | <13.6.5 | 13.6.5 |
<12.7.4 | 12.7.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
The severity of CVE-2024-23230 is classified as a medium risk due to potential unauthorized access to sensitive user data.
To fix CVE-2024-23230, upgrade to macOS Sonoma 14.4, macOS Monterey 12.7.4, or macOS Ventura 13.6.5.
CVE-2024-23230 affects macOS versions prior to 12.7.4, 13.6.5, and 14.4.
CVE-2024-23230 could potentially allow apps to access sensitive user data without permission.
Yes, a patch for CVE-2024-23230 is included in the latest updates for affected macOS versions.