First published: Mon May 13 2024(Updated: )
Apple Neural Engine. The issue was addressed with improved memory handling.
Credit: an anonymous researcher product-security@apple.com Pr BarPr Hebrew University EP LFY @secsys Fudan UniversityDaniel Zajork Joshua Zajork Meysam Firouzi @R00tkitsmm Trend Micro Zero Day InitiativeMickey Jin @patch1t Pedro Tôrres @t0rr3sp3dr0 CVE-2024-27806 ajajfxhj an anonymous researcher Concentrix凯 王 ConcentrixSteven Maser ConcentrixMatthew McLean ConcentrixBrandon Chesser ConcentrixCPU IT inc Concentrix ConcentrixAvalon IT Team ConcentrixCVE-2024-23296 Yann GASCUEL Alter SolutionsKirin @Pwnrin 小来来 @Smi1eSEC pattern-f @pattern_F_ Ant Security LightAmir Bazine CrowdStrike Counter Adversary OperationsKarsten König CrowdStrike Counter Adversary OperationsJoshua Jewett @JoshJewett33 Gil Pedersen Dohyun Lee @l33d0hyun Romy R. Maksymilian Motyl Immunity SystemsJunsung Lee Trend Micro Zero Day InitiativeEmilio Cobos MozillaManfred Paul @_manfp Trend Micro Zero Day InitiativeManfred Paul @_manfp Trend Micro's Zero Day InitiativeJeff Johnson underpassappRon Masas ImpervaCertiK SkyFall Team an anonymous researcher MIT CSAIL MIT CSAILJoseph Ravichandran @0xjprx MIT CSAILNick Wellnhofer Michael DePlante @izobashi Trend Micro Zero Day InitiativeScott Johnson RIPEDA ConsultingMykola Grymalyuk RIPEDA ConsultingJordy Witteman Carlos Polop Narendra Bhati Suma Soft PvtShaheen Fazim Csaba Fitzl @theevilbit KandjiLFY @secsys yulige Snoolie Keffaber @0xilis Robert Reichel Lukas Bernhard CISPA Helmholtz Center for Information SecurityNan Wang @eternalsakura13 360 Vulnerability Research InstituteJoe Rutkowski @Joe12387 Crawless @abrahamjuliot Pwn2car Trend Micro's Zero Day Initiative Trend Micro's Zero Day InitiativeMichael DePlante @izobashi Trend Micro's Zero Day InitiativeMinghao Lin Baidu Security Baidu SecurityYe Zhang @VAR10CK Baidu SecurityMeysam Firouzi @R00tkitSMM
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS | <14.5 | 14.5 |
Apple iOS, iPadOS, and watchOS | <16.7.8 | 16.7.8 |
Apple iOS, iPadOS, and watchOS | <16.7.8 | 16.7.8 |
Apple iOS, iPadOS, and watchOS | <16.7.8 | |
iStyle @cosme iPhone OS | <16.7.8 | |
Apple iOS and macOS | <12.7.5 | |
Apple iOS and macOS | >=13.0<13.6.7 | |
Apple iOS and macOS | >=14.0<14.5 | |
macOS | <12.7.5 | 12.7.5 |
macOS Ventura | <13.6.7 | 13.6.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2024-27799 has been categorized as a moderately severe vulnerability impacting certain Apple operating systems.
To fix CVE-2024-27799, users should update to macOS Sonoma 14.5, macOS Ventura 13.6.7, macOS Monterey 12.7.5, iOS 16.7.8, or iPadOS 16.7.8.
CVE-2024-27799 affects macOS Monterey versions prior to 12.7.5, macOS Ventura versions prior to 13.6.7, macOS Sonoma versions prior to 14.5, and iOS/iPadOS versions prior to 16.7.8.
CVE-2024-27799 is a security issue in IOHIDFamily that allows unprivileged applications to potentially log keystrokes.
There are no known workarounds for CVE-2024-27799, and users are advised to update their systems.