First published: Mon May 13 2024(Updated: )
A downgrade issue affecting Intel-based Mac computers was addressed with additional code-signing restrictions. This issue is fixed in macOS Sonoma 14.5. An app may be able to bypass certain Privacy preferences.
Credit: product-security@apple.com Kirin @Pwnrin Mickey Jin @patch1t Narendra Bhati Suma Soft PvtShaheen Fazim Csaba Fitzl @theevilbit KandjiLFY @secsys 小来来 @Smi1eSEC yulige Snoolie Keffaber @0xilis Robert Reichel an anonymous researcher CVE-2024-27806 Yann GASCUEL Alter SolutionsCertiK SkyFall Team ajajfxhj Maksymilian Motyl Immunity SystemsJunsung Lee Trend Micro Zero Day InitiativeManfred Paul @_manfp Trend Micro's Zero Day InitiativeEmilio Cobos MozillaLukas Bernhard CISPA Helmholtz Center for Information SecurityNan Wang @eternalsakura13 360 Vulnerability Research InstituteJoe Rutkowski @Joe12387 Crawless @abrahamjuliot Jeff Johnson underpassappMinghao Lin Baidu Security Baidu SecurityYe Zhang @VAR10CK Baidu SecurityMeysam Firouzi @R00tkitSMM Amir Bazine CrowdStrike Counter Adversary OperationsKarsten König CrowdStrike Counter Adversary OperationsPwn2car Trend Micro's Zero Day Initiative Trend Micro's Zero Day InitiativeMichael DePlante @izobashi Trend Micro's Zero Day InitiativeRon Masas Impervapattern-f @pattern_F_ Ant Security Lightan anonymous researcher MIT CSAIL MIT CSAILJoseph Ravichandran @0xjprx MIT CSAILPr BarPr Hebrew UniversityEP Nick Wellnhofer Gil Pedersen Dohyun Lee @l33d0hyun LFY @secsys Fudan UniversityDaniel Zajork Joshua Zajork Meysam Firouzi @R00tkitsmm Trend Micro Zero Day InitiativeMichael DePlante @izobashi Trend Micro Zero Day InitiativeScott Johnson RIPEDA ConsultingMykola Grymalyuk RIPEDA ConsultingJordy Witteman Carlos Polop Pedro Tôrres @t0rr3sp3dr0
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS | >=14.0<14.5 | |
Apple macOS | <14.5 | 14.5 |
<14.5 | 14.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2024-27825 has been classified as a moderate severity vulnerability affecting Intel-based Mac computers.
To fix CVE-2024-27825, update your macOS to version 14.5 or later.
CVE-2024-27825 affects Intel-based Mac computers running macOS versions 14.0 to 14.4.
CVE-2024-27825 is a downgrade issue that may allow apps to bypass certain Privacy preferences.
CVE-2024-27825 was disclosed in May 2024.