First published: Mon Sep 16 2024(Updated: )
Accounts. A permissions issue was addressed with additional restrictions.
Credit: Csaba Fitzl @theevilbit Kandjian anonymous researcher Kirin @Pwnrin Mickey Jin @patch1t Noah Gregory (wts.dev) Arsenii Kostromin (0x3c3e) Mickey Jin @patch1t KandjiUn3xploitable CW Research IncBohdan Stasiuk @Bohdan_Stasiuk CW Research IncPedro Tôrres @t0rr3sp3dr0 냥냥 Michael DePlante @izobashi Trend Micro Zero Day InitiativeHalle Winkler Politepix @hallewinkler Bing Shi Alibaba GroupWenchao Li Alibaba GroupXiaolong Bai Alibaba Group Indiana University BloomingtonLuyi Xing Indiana University BloomingtonHossein Lotfi @hosselot Trend Micro Zero Day InitiativeJunsung Lee Trend Micro Zero Day Initiativedw0r! Trend Micro Zero Day InitiativeBohdan Stasiuk @Bohdan_Stasiuk Alexandre Bedard Ronny Stiftel Wang Yu CyberservalJex Amro Zhongquan Li @Guluisacat Mateusz Krzywicki @krzywix pattern-f @pattern_F_ Loadshine LabHikerell Loadshine LabIvan Fratric Google Project ZeroRodolphe Brunetti @eisw0lf CVE-2023-4504 @08Tc3wBB JamfDenis Tokarev @illusionofcha0s Yiğit Can YILMAZ @yilmazcanyigit Junsung Lee dw0r ZeroPointer Lab working with Trend Micro Zero Day InitiativeAntonio Zekić Andrew Lytvynov Alexander Heinrich SEEMOO DistriNet KU Leuven @vanhoefm TU Darmstadt @Sn0wfreeze Mathy Vanhoef Jeff Johnson (underpassapp.com) OSS-Fuzz Google Project ZeroNed Williamson Google Project ZeroRodolphe BRUNETTI @eisw0lf Kirin @Pwnrin Fudan UniversityLFY @secsys Fudan UniversityOlivier Levon CVE-2023-5841 Meng Zhang (鲸落) NorthSeaajajfxhj Brian McNulty Computer ScienceCristian Dinca Computer ScienceRomania Vaibhav Prajapati CVE-2024-39894 Wojciech Regula SecuRingRifa'i Rejal Maynando Narendra Bhati Cyber Security at Suma Soft PvtManager Cyber Security at Suma Soft PvtPune (India) Yiğit Can YILMAZ @yilmazcanyigit SecuRingKirin @Pwnrin NorthSeaVivek Dhar working as Assistant Sub-Inspector (RM) in Border Security Force (Frontier Headquarter BSF Kashmir) Pedro José Pereira Vieito @pvieito luckyu @uuulucky NorthSeaOm Kothawade the UNTHSC College of PharmacyOmar A. Alanis the UNTHSC College of PharmacyBistrit Dahal Matej Moravec @MacejkoMoravec K宝 LFY @secsys Smi1e yulige Cristian Dinca (icmd.tech) Ron Masas BreakPointJonathan Bar Or @yo_yo_yo_jbo MicrosoftCVE-2024-41957 Narendra Bhati Cyber Security At Suma Soft PvtManager Cyber Security At Suma Soft PvtTashita Software Security Ron Masas Hafiizh HakTrakYoKo Kho @yokoacc HakTrakTim Michaud @TimGMichaud MoveworksAntonio Zekic @antoniozekic ant4g0nist Charly Suchanek CVE-2024-44134 Preet Dsouza (Fleming College Computer Security & Investigations Program) Domien Schepers Tim Clem Gergely Kalman @gergely_kalman Koh M. Nakagawa @tsunek0h CVE-2024-44130 Pwn2car Trend Micro Zero Day InitiativeClaudio Bozzato Cisco TalosFrancesco Benvenuto Cisco TalosHolger Fuhrmannek Anton Boegler Snoolie Keffaber @0xilis CVE-2024-44129 product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS | <14.7.1 | 14.7.1 |
macOS | <15 | 15 |
macOS | <14.7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2024-44175 has been classified with a high severity level due to its permissions issues that could be exploited.
To fix CVE-2024-44175, update your macOS to version 14.7.1 or higher for macOS Sonoma or to version 15 for macOS Sequoia.
CVE-2024-44175 affects macOS versions prior to 14.7.1 for Sonoma and 15 for Sequoia.
CVE-2024-44175 addresses issues related to permissions and improved checks within the macOS account management.
CVE-2024-44175 is specific to Apple devices running the affected versions of macOS.