First published: Mon May 13 2024(Updated: )
Apple Neural Engine. The issue was addressed with improved memory handling.
Credit: an anonymous researcher Minghao Lin Baidu Security Baidu SecurityYe Zhang @VAR10CK Baidu SecurityMeysam Firouzi @R00tkitSMM Mickey Jin @patch1t Kirin @Pwnrin 小来来 @Smi1eSEC pattern-f @pattern_F_ Ant Security LightAmir Bazine CrowdStrike Counter Adversary OperationsKarsten König CrowdStrike Counter Adversary OperationsLucas Monteiro Daniel Monteiro Felipe Monteiro Alexander Heinrich SEEMOO TU Darmstadt @Sn0wfreeze Shai Mishali @freak4pc CertiK SkyFall Team Junsung Lee Trend Micro Zero Day InitiativePan ZhenPeng @Peterpan0927 STAR Labs SG Ptean anonymous researcher MIT CSAIL MIT CSAILJoseph Ravichandran @0xjprx MIT CSAILPr BarPr Hebrew UniversityEP Nick Wellnhofer Gil Pedersen Dohyun Lee @l33d0hyun LFY @secsys Fudan UniversityTalal Haj Bakry Mysk IncTommy Mysk @mysk_co Mysk IncDaniel Zajork Joshua Zajork Meysam Firouzi @R00tkitsmm Trend Micro Zero Day InitiativeMichael DePlante @izobashi Trend Micro Zero Day InitiativeAndr.Ess Adam Berry Csaba Fitzl @theevilbit KandjiLFY @secsys yulige Snoolie Keffaber @0xilis Robert Reichel Srijan Poudel CVE-2024-27806 Abhay Kailasia @abhay_kailasia Lakshmi Narain College of Technology BhopalRomy R. ajajfxhj Maksymilian Motyl Immunity SystemsManfred Paul @_manfp Trend Micro's Zero Day InitiativeEmilio Cobos MozillaLukas Bernhard CISPA Helmholtz Center for Information SecurityManfred Paul @_manfp Trend Micro Zero Day InitiativeNan Wang @eternalsakura13 360 Vulnerability Research InstituteJoe Rutkowski @Joe12387 Crawless @abrahamjuliot Jeff Johnson underpassappDalibor Milanovic Pedro Tôrres @t0rr3sp3dr0 an anonymous researcher Concentrix凯 王 ConcentrixSteven Maser ConcentrixMatthew McLean ConcentrixBrandon Chesser ConcentrixCPU IT inc Concentrix ConcentrixAvalon IT Team ConcentrixCVE-2024-23296 Yann GASCUEL Alter SolutionsJoshua Jewett @JoshJewett33 Narendra Bhati Suma Soft PvtShaheen Fazim Ryan Pickren (ryanpickren.com) product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS Monterey | <12.7.5 | 12.7.5 |
Apple iOS | <17.5 | 17.5 |
Apple iPadOS | <17.5 | 17.5 |
Apple iOS | <16.7.8 | 16.7.8 |
Apple iPadOS | <16.7.8 | 16.7.8 |
Apple visionOS | <1.2 | 1.2 |
Apple macOS | <13.6.7 | 13.6.7 |
watchOS | <10.5 | 10.5 |
Apple iPadOS | <16.7.8 | |
Apple iPadOS | >=17.0<17.5 | |
Apple iPhone OS | <16.7.8 | |
Apple iPhone OS | >=17.0<17.5 | |
Apple macOS | >=12.0<12.7.5 | |
Apple macOS | >=13.0<13.6.7 | |
tvOS | <17.5 | |
Apple visionOS | <1.2 | |
watchOS | <10.5 | |
tvOS | <17.5 | 17.5 |
iPadOS | <17.5 | 17.5 |
iPadOS | <16.7.8 | 16.7.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2024-27840 has been identified as a critical vulnerability due to potential memory mishandling which could lead to remote code execution.
To mitigate CVE-2024-27840, users should update their systems to the latest versions, including macOS Ventura 13.6.7, macOS Monterey 12.7.5, iOS 16.7.8, iPadOS 16.7.8, tvOS 17.5, and watchOS 10.5.
CVE-2024-27840 affects multiple Apple products, including macOS Ventura, macOS Monterey, iOS, iPadOS, tvOS, watchOS, and visionOS.
CVE-2024-27840 is considered exploitable as it allows an attacker to execute arbitrary code with elevated permissions due to improper memory handling.
The potential impacts of CVE-2024-27840 include system crashes, unauthorized data access, and execution of malicious code on affected devices.