First published: Mon Jul 29 2024(Updated: )
APFS. The issue was addressed with improved restriction of data container access.
Credit: Abhay Kailasia @abhay_kailasia Lakshmi Narain College of Technology Bhopal IndiaMickey Jin @patch1t D4m0n w0wbox Csaba Fitzl @theevilbit KandjiCVE-2023-6277 CVE-2023-52356 Yisumi Junsung Lee Trend Micro Zero Day InitiativeAmir Bazine CrowdStrike Counter Adversary OperationsKarsten König CrowdStrike Counter Adversary OperationsGandalf4a CertiK SkyFall Team Minghao Lin Zhejiang UniversityJiaxun Zhu Zhejiang UniversityCVE-2024-40805 Jacob Braun Wojciech Regula SecuRingZhongquan Li @Guluisacat Dawn Security Lab of JingDongan anonymous researcher Kirin @Pwnrin Bistrit Dahal Srijan Poudel Huang Xilin Ant Group LightMaksymilian Motyl Johan Carlsson (joaxcar) Seunghyun Lee @0x10n KAIST Hacking Lab working with Trend Micro Zero Day InitiativeGary Kwong Andreas Jaegersberger Ro Achterberg Mateen Alinaghi Dawn Security Lab of JingDongMickey Jin @patch1t KandjiJiahui Hu (梅零落) NorthSeaMeng Zhang (鲸落) NorthSeaMatthew Butler CVE-2024-4558 Adam M. CrowdStrike Counter Adversary OperationsMinghao Lin Baidu Security Baidu SecurityYe Zhang @VAR10CK Baidu SecurityMichael DePlante @izobashi Trend Micro Zero Day InitiativeCVE-2024-2004 CVE-2024-2379 CVE-2024-2398 CVE-2024-2466 sqrtpwn Patrick Wardle DoubleYouCVE-2024-6387 Claudio Bozzato Cisco TalosFrancesco Benvenuto Cisco TalosYadhu Krishna M Cyber Security At Suma Soft PvtNarendra Bhati Cyber Security At Suma Soft PvtManager Cyber Security At Suma Soft PvtPune (India) Joshua Jones Marcio Almeida Tanto SecurityMatthew Loewen product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS | <13.6.8 | 13.6.8 |
watchOS | <10.6 | 10.6 |
Apple iOS | <16.7.9 | 16.7.9 |
iPadOS | <16.7.9 | 16.7.9 |
Apple iOS | <17.6 | 17.6 |
iPadOS | <17.6 | 17.6 |
iPadOS | <16.7.9 | |
iPadOS | >=17.0<17.6 | |
Apple iPhone OS | <16.7.9 | |
Apple iPhone OS | >=17.0<17.6 | |
Apple macOS | >=13.0<13.6.8 | |
watchOS | <10.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2024-40829 is classified as a moderate severity vulnerability that allows restricted content to be viewed from the lock screen.
To fix CVE-2024-40829, update your device to watchOS 10.6, iOS 17.6, iPadOS 17.6, or macOS Ventura 13.6.8.
CVE-2024-40829 affects watchOS versions prior to 10.6, iOS versions prior to 17.6, iPadOS versions prior to 17.6, and macOS Ventura versions prior to 13.6.8.
CVE-2024-40829 requires physical access to the device to exploit the vulnerability.
CVE-2024-40829 may allow unauthorized access to emails, text messages, or other restricted content displayed on the lock screen.