First published: Mon Jul 29 2024(Updated: )
Accounts. The issue was addressed with improved checks.
Credit: Csaba Fitzl @theevilbit Kandji product-security@apple.com Minghao Lin Baidu Security Baidu SecurityYe Zhang @VAR10CK Baidu SecurityMickey Jin @patch1t Michael DePlante @izobashi Trend Micro Zero Day InitiativeD4m0n Amir Bazine CrowdStrike Counter Adversary OperationsKarsten König CrowdStrike Counter Adversary OperationsCVE-2024-2004 CVE-2024-2379 CVE-2024-2398 CVE-2024-2466 an anonymous researcher CVE-2023-6277 CVE-2023-52356 Yisumi sqrtpwn Minghao Lin Zhejiang UniversityJiaxun Zhu Zhejiang UniversityPatrick Wardle DoubleYouAdam M. CVE-2024-6387 Zhongquan Li @Guluisacat Dawn Security Lab of JingDongClaudio Bozzato Cisco TalosFrancesco Benvenuto Cisco TalosCVE-2024-23296 Yadhu Krishna M Cyber Security At Suma Soft PvtNarendra Bhati Cyber Security At Suma Soft PvtManager Cyber Security At Suma Soft PvtPune (India) Kirin @Pwnrin Joshua Jones Marcio Almeida Tanto SecurityJiahui Hu (梅零落) NorthSeaMeng Zhang (鲸落) NorthSeaMatthew Loewen w0wbox Junsung Lee Trend Micro Zero Day InitiativeGandalf4a Bistrit Dahal Srijan Poudel Abhay Kailasia @abhay_kailasia Lakshmi Narain College of Technology Bhopal IndiaIES Red Team ByteDanceLinwz DEVCOREYeto CertiK SkyFall Team Yann Gascuel Alter Solutions CrowdStrike Counter Adversary OperationsWang Yu CyberservalCVE-2024-40805 Rodolphe BRUNETTI @eisw0lf Pedro Tôrres @t0rr3sp3dr0 Mickey Jin @patch1t Kandji KandjiMateen Alinaghi Csaba Fitzl @theevilbit Offensive SecurityWojciech Regula SecuRing Dawn Security Lab of JingDongJiwon Park Arsenii Kostromin (0x3c3e) ajajfxhj Huang Xilin Ant Group LightMaksymilian Motyl Johan Carlsson (joaxcar) Seunghyun Lee @0x10n KAIST Hacking Lab working with Trend Micro Zero Day InitiativeCVE-2024-4558 Matthew Butler Gary Kwong Andreas Jaegersberger Ro Achterberg
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS | <14.6 | 14.6 |
macOS | <12.7.6 | 12.7.6 |
macOS Ventura | <13.6.8 | 13.6.8 |
macOS | >=12.0<12.7.6 | |
macOS | >=13.0<13.6.8 | |
macOS | >=14.0<14.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2024-40783 has a moderate severity level as it involves data container access vulnerabilities.
To fix CVE-2024-40783, update your system to macOS Sonoma 14.6, macOS Ventura 13.6.8, or macOS Monterey 12.7.6.
CVE-2024-40783 affects macOS versions prior to 12.7.6, 13.6.8, and 14.6.
The vendor for CVE-2024-40783 is Apple.
Yes, a malicious application may exploit CVE-2024-40783 to bypass privacy protections.