First published: Tue Mar 05 2024(Updated: )
Accessibility. A privacy issue was addressed with improved private data redaction for log entries.
Credit: Kirin @Pwnrin luckyu @uuulucky Mickey Jin @patch1t an anonymous researcher K宝 Fudan UniversityLFY @secsys Fudan UniversityLewis Hardy Bistrit Dahal CVE-2024-23241 CVE-2024-23242 Joshua Jewett @JoshJewett33 Matthew Loewen Deutsche Telekom Security GmbH sponsored by Bundesamt für Sicherheit in der Informationstechnik anbu1024 SecANTPwn2car James Lee @Windowsrcer Johan Carlsson (joaxcar) Georg Felber Marco Squarcina CVE-2024-23238 Wojciech Regula SecuRingYiğit Can YILMAZ @yilmazcanyigit Lyra Rebane (rebane2001) Matej Rabzelj CVE-2024-23225 koocola ali yabuz Meysam Firouzi @R00tkitsmm Trend Micro Zero Day Initiative @08Tc3wBB JamfCVE-2024-23283 CVE-2023-48795 CVE-2023-51384 CVE-2023-51385 Pedro Tôrres @t0rr3sp3dr0 Bohdan Stasiuk @Bohdan_Stasiuk Harsh Tyagi CVE-2024-23296 Junsung Lee Trend Micro Zero Day InitiativeZhenjiang Zhao pangu teamQianxin CrowdStrike Counter Adversary Operations CrowdStrike Counter Adversary OperationsAmir Bazine CrowdStrike Counter Adversary OperationsKarsten König CrowdStrike Counter Adversary OperationsDohyun Lee @l33d0hyun Lyutoon Mr.R Murray Mike CVE-2024-23235 Xinru Chi Pangu Labm4yfly with TianGong Team Legendsec at Qi'anxin GroupGuilherme Rambo Best Buddy AppsCsaba Fitzl @theevilbit OffSecCVE-2024-23205 CVE-2022-48554 Marc Newlin SkySafeBrian McNulty Stephan Casas CVE-2024-23291 CVE-2024-23220 Patrick Reardon scj643 Om Kothawade Cristian Dinca Computer ScienceRomania product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
<14.4 | 14.4 | |
Apple macOS | <14.4 | 14.4 |
tvOS | <17.4 | 17.4 |
Apple iOS, iPadOS, and watchOS | <10.4 | 10.4 |
Apple iOS, iPadOS, and watchOS | <17.4 | 17.4 |
Apple iOS, iPadOS, and watchOS | <17.4 | 17.4 |
visionOS | <1.1 | 1.1 |
<17.4 | ||
<17.4 | ||
<14.4 | ||
<17.4 | ||
<1.1 | ||
<10.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2024-27859 is classified as a moderate severity vulnerability.
To fix CVE-2024-27859, update affected devices to the latest version of macOS Sonoma, visionOS, iOS, iPadOS, tvOS, or watchOS as recommended by Apple.
CVE-2024-27859 affects Apple products including macOS Sonoma, visionOS, iOS, iPadOS, tvOS, and watchOS up to specified versions.
CVE-2024-27859 addresses privacy issues related to data redaction in log entries and improves entitlement checks in the affected software.
Not updating your device related to CVE-2024-27859 may expose you to potential privacy risks and unauthorized data access.