First published: Fri Feb 02 2024(Updated: )
Miro Desktop 0.8.18 on macOS allows code injection via a complex series of steps that might be usable in some environments (bypass a kTCCServiceSystemPolicyAppBundles requirement via a file copy, an app.app/Contents rename, an asar modification, and a rename back to app.app/Contents).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Miro | =0.8.18 | |
Apple macOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23746 is considered a significant vulnerability due to its potential for code injection on macOS.
To mitigate CVE-2024-23746, ensure that you are using the latest version of Miro Desktop and follow best security practices for macOS.
CVE-2024-23746 could allow attackers to execute arbitrary code on affected systems if exploited.
CVE-2024-23746 specifically affects Miro Desktop version 0.8.18.
No, macOS itself is not inherently vulnerable, but the specific configuration of Miro Desktop version 0.8.18 on macOS can lead to exploitation.