First published: Mon Sep 16 2024(Updated: )
Accessibility. This issue was addressed through improved state management.
Credit: product-security@apple.com Mickey Jin @patch1t Claudio Bozzato Cisco TalosFrancesco Benvenuto Cisco TalosAnton Boegler Snoolie Keffaber @0xilis an anonymous researcher Csaba Fitzl @theevilbit KandjiDenis Tokarev @illusionofcha0s dw0r ZeroPointer Lab working with Trend Micro Zero Day InitiativeMichael DePlante @izobashi Trend Micro Zero Day InitiativeAntonio Zekić Andrew Lytvynov Rodolphe BRUNETTI @eisw0lf Kirin @Pwnrin Fudan UniversityLFY @secsys Fudan UniversityOlivier Levon ajajfxhj Rifa'i Rejal Maynando Zhongquan Li @Guluisacat Kirin @Pwnrin Kirin @Pwnrin NorthSealuckyu @uuulucky NorthSeaBohdan Stasiuk @Bohdan_Stasiuk Stephan Casas CVE-2024-44129 Jake Derouin (jakederouin.com) Holger Fuhrmannek Junsung Lee Alexander Heinrich SEEMOO DistriNet KU Leuven @vanhoefm TU Darmstadt @Sn0wfreeze Mathy Vanhoef Anamika Adhikari Bistrit Dahal Matej Moravec @MacejkoMoravec Justin Cohen Pwn2car Trend Micro Zero Day InitiativePedro José Pereira Vieito @pvieito Arsenii Kostromin (0x3c3e) Yiğit Can YILMAZ @yilmazcanyigit Pedro Tôrres @t0rr3sp3dr0 CVE-2024-44130 Halle Winkler Politepix @hallewinkler Rodolphe Brunetti @eisw0lf CVE-2023-4504 @08Tc3wBB JamfJeff Johnson (underpassapp.com) OSS-Fuzz Google Project ZeroNed Williamson Google Project ZeroCVE-2023-5841 Meng Zhang (鲸落) NorthSeaBrian McNulty Computer ScienceCristian Dinca Computer ScienceRomania Vaibhav Prajapati CVE-2024-39894 Wojciech Regula SecuRingNarendra Bhati Cyber Security at Suma Soft PvtManager Cyber Security at Suma Soft PvtPune (India) Yiğit Can YILMAZ @yilmazcanyigit SecuRing냥냥 Vivek Dhar working as Assistant Sub-Inspector (RM) in Border Security Force (Frontier Headquarter BSF Kashmir) Om Kothawade the UNTHSC College of PharmacyOmar A. Alanis the UNTHSC College of PharmacyK宝 LFY @secsys Smi1e yulige Cristian Dinca (icmd.tech) Ron Masas BreakPointJonathan Bar Or @yo_yo_yo_jbo MicrosoftCVE-2024-41957 Narendra Bhati Cyber Security At Suma Soft PvtManager Cyber Security At Suma Soft PvtTashita Software Security Ron Masas Hafiizh HakTrakYoKo Kho @yokoacc HakTrakTim Michaud @TimGMichaud MoveworksAntonio Zekic @antoniozekic ant4g0nist Charly Suchanek CVE-2024-44134 Preet Dsouza (Fleming College Computer Security & Investigations Program) Domien Schepers Tim Clem Gergely Kalman @gergely_kalman Koh M. Nakagawa @tsunek0h
Affected Software | Affected Version | How to fix |
---|---|---|
macOS Ventura | <13.7 | 13.7 |
Apple macOS | <14.7 | 14.7 |
macOS | <15 | 15 |
Apple iOS and iPadOS | <17.7 | 17.7 |
Apple iOS, iPadOS, and macOS | <17.7 | 17.7 |
macOS | <13.7 | |
macOS | >=14.0<14.7 | |
Apple iOS, iPadOS, and macOS | <17.7 | |
iPhone OS | <17.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2024-44164 is considered a high severity vulnerability due to its potential impact on accessibility and account permissions.
Fix CVE-2024-44164 by updating your affected Apple devices to the latest version of macOS, iOS, or iPadOS.
CVE-2024-44164 affects macOS Ventura, macOS Sonoma, macOS Sequoia, iOS, and iPadOS versions up to 17.7.
CVE-2024-44164 specifically addresses issues related to accessibility, permissions, and state management on Apple devices.
There are no recommended workarounds for CVE-2024-44164; updating your software is the best mitigation strategy.