First published: Mon Sep 16 2024(Updated: )
A logic issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.1, macOS Sequoia 15, macOS Sonoma 14.7.1. An application may be able to break out of its sandbox.
Credit: product-security@apple.com Michael DePlante @izobashi Trend Micro Zero Day InitiativePwn2car Trend Micro Zero Day InitiativeMickey Jin @patch1t Kirin @Pwnrin Claudio Bozzato Cisco TalosFrancesco Benvenuto Cisco TalosHalle Winkler Politepix @hallewinkler Holger Fuhrmannek Anton Boegler Snoolie Keffaber @0xilis an anonymous researcher Yiğit Can YILMAZ @yilmazcanyigit Rodolphe Brunetti @eisw0lf CVE-2023-4504 Csaba Fitzl @theevilbit Kandji @08Tc3wBB JamfDenis Tokarev @illusionofcha0s Junsung Lee dw0r ZeroPointer Lab working with Trend Micro Zero Day InitiativeAntonio Zekić Andrew Lytvynov Alexander Heinrich SEEMOO DistriNet KU Leuven @vanhoefm TU Darmstadt @Sn0wfreeze Mathy Vanhoef OSS-Fuzz Google Project ZeroNed Williamson Google Project ZeroRodolphe BRUNETTI @eisw0lf Kirin @Pwnrin Fudan UniversityLFY @secsys Fudan UniversityOlivier Levon CVE-2023-5841 Meng Zhang (鲸落) NorthSeaajajfxhj Brian McNulty Computer ScienceCristian Dinca Computer ScienceRomania Vaibhav Prajapati CVE-2024-39894 Wojciech Regula SecuRingRifa'i Rejal Maynando Narendra Bhati Cyber Security at Suma Soft PvtManager Cyber Security at Suma Soft PvtPune (India) Zhongquan Li @Guluisacat Yiğit Can YILMAZ @yilmazcanyigit SecuRingKirin @Pwnrin NorthSea냥냥 Vivek Dhar Pedro José Pereira Vieito @pvieito luckyu @uuulucky NorthSeaOm Kothawade the UNTHSC College of PharmacyOmar A. Alanis the UNTHSC College of PharmacyK宝 LFY @secsys Smi1e yulige Cristian Dinca (icmd.tech) Arsenii Kostromin (0x3c3e) Jonathan Bar Or @yo_yo_yo_jbo MicrosoftBohdan Stasiuk @Bohdan_Stasiuk CVE-2024-41957 Ron Masas Hafiizh HakTrakYoKo Kho @yokoacc HakTrakCharly Suchanek CVE-2024-44134 Domien Schepers Tim Clem Gergely Kalman @gergely_kalman Koh M. Nakagawa @tsunek0h CVE-2024-44129 Pedro Tôrres @t0rr3sp3dr0 CVE-2024-44130 Mateusz Krzywicki @krzywix Noah Gregory (wts.dev) Mickey Jin @patch1t KandjiUn3xploitable CW Research IncBohdan Stasiuk @Bohdan_Stasiuk CW Research IncBing Shi Alibaba GroupWenchao Li Alibaba GroupXiaolong Bai Alibaba Group Indiana University BloomingtonLuyi Xing Indiana University BloomingtonHossein Lotfi @hosselot Trend Micro Zero Day InitiativeJunsung Lee Trend Micro Zero Day Initiativedw0r! Trend Micro Zero Day InitiativeAlexandre Bedard Ronny Stiftel Wang Yu CyberservalJex Amro Ivan Fratric Google Project Zeropattern-f @pattern_F_ Loadshine LabHikerell Loadshine Lab
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS | <13.7.1 | |
Apple macOS | >=14.0<14.7.1 | |
Apple macOS | <13.7.1 | 13.7.1 |
Apple macOS | <14.7.1 | 14.7.1 |
Apple macOS Sequoia | <15 | 15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2024-44122 has been classified as a critical vulnerability due to its potential to allow applications to break out of their sandbox.
To mitigate CVE-2024-44122, update to macOS Ventura 13.7.1, macOS Sequoia 15, or macOS Sonoma 14.7.1.
CVE-2024-44122 affects macOS versions prior to 13.7.1, any release between 14.0 and 14.7.1, and versions prior to 15.
CVE-2024-44122 primarily affects systems running specific versions of macOS, including Ventura, Sequoia, and Sonoma.
CVE-2024-44122 exploits a logic issue that could allow applications to bypass sandbox restrictions.