First published: Mon Jul 29 2024(Updated: )
A downgrade issue was addressed with additional code-signing restrictions. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. An app may be able to leak sensitive user information.
Credit: Mickey Jin @patch1t product-security@apple.com Michael DePlante @izobashi Trend Micro Zero Day InitiativeD4m0n Amir Bazine CrowdStrike Counter Adversary OperationsKarsten König CrowdStrike Counter Adversary OperationsCVE-2024-2004 CVE-2024-2379 CVE-2024-2398 CVE-2024-2466 an anonymous researcher CVE-2023-6277 CVE-2023-52356 Yisumi sqrtpwn Minghao Lin Zhejiang UniversityJiaxun Zhu Zhejiang UniversityPatrick Wardle DoubleYouAdam M. CVE-2024-6387 Zhongquan Li @Guluisacat Dawn Security Lab of JingDongCsaba Fitzl @theevilbit KandjiClaudio Bozzato Cisco TalosFrancesco Benvenuto Cisco TalosCVE-2024-23296 Yadhu Krishna M Cyber Security At Suma Soft PvtNarendra Bhati Cyber Security At Suma Soft PvtManager Cyber Security At Suma Soft PvtPune (India) Kirin @Pwnrin Joshua Jones Marcio Almeida Tanto SecurityJiahui Hu (梅零落) NorthSeaMeng Zhang (鲸落) NorthSeaMatthew Loewen Minghao Lin Baidu Security Baidu SecurityYe Zhang @VAR10CK Baidu Securityw0wbox Junsung Lee Trend Micro Zero Day InitiativeGandalf4a Bistrit Dahal Srijan Poudel Abhay Kailasia @abhay_kailasia Lakshmi Narain College of Technology Bhopal IndiaIES Red Team ByteDanceLinwz DEVCOREYeto CertiK SkyFall Team Yann Gascuel Alter Solutions CrowdStrike Counter Adversary OperationsWang Yu CyberservalCVE-2024-40805 Rodolphe BRUNETTI @eisw0lf Pedro Tôrres @t0rr3sp3dr0 Mickey Jin @patch1t Kandji KandjiMateen Alinaghi Csaba Fitzl @theevilbit Offensive SecurityWojciech Regula SecuRing Dawn Security Lab of JingDongJiwon Park Arsenii Kostromin (0x3c3e) ajajfxhj Huang Xilin Ant Group LightMaksymilian Motyl Johan Carlsson (joaxcar) Seunghyun Lee @0x10n KAIST Hacking Lab working with Trend Micro Zero Day InitiativeCVE-2024-4558 Matthew Butler Gary Kwong Andreas Jaegersberger Ro Achterberg
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS | <14.6 | 14.6 |
macOS | <12.7.6 | 12.7.6 |
macOS Ventura | <13.6.8 | 13.6.8 |
macOS | <12.7.6 | |
macOS | >=13.0<13.6.8 | |
macOS | >=14.0<14.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
The severity of CVE-2024-40775 is classified as moderate due to its potential to leak sensitive user information.
To fix CVE-2024-40775, upgrade to macOS Sonoma 14.6, macOS Ventura 13.6.8, or macOS Monterey 12.7.6.
CVE-2024-40775 affects macOS versions prior to 12.7.6, 13.6.8, and 14.6.
CVE-2024-40775 addresses a downgrade issue with additional code-signing restrictions.
Yes, an application may be able to leak sensitive user information due to CVE-2024-40775.