First published: Mon Sep 16 2024(Updated: )
Accessibility. This issue was addressed by restricting options offered on a locked device.
Credit: Kirin @Pwnrin Rodolphe Brunetti @eisw0lf CVE-2023-4504 Csaba Fitzl @theevilbit Kandjian anonymous researcher @08Tc3wBB JamfDenis Tokarev @illusionofcha0s Yiğit Can YILMAZ @yilmazcanyigit Mickey Jin @patch1t Junsung Lee dw0r ZeroPointer Lab working with Trend Micro Zero Day InitiativeMichael DePlante @izobashi Trend Micro Zero Day InitiativeAntonio Zekić Andrew Lytvynov Alexander Heinrich SEEMOO DistriNet KU Leuven @vanhoefm TU Darmstadt @Sn0wfreeze Mathy Vanhoef Jeff Johnson (underpassapp.com) OSS-Fuzz Google Project ZeroNed Williamson Google Project ZeroRodolphe BRUNETTI @eisw0lf Kirin @Pwnrin Fudan UniversityLFY @secsys Fudan UniversityOlivier Levon CVE-2023-5841 Meng Zhang (鲸落) NorthSeaajajfxhj Brian McNulty Computer ScienceCristian Dinca Computer ScienceRomania Vaibhav Prajapati CVE-2024-39894 Wojciech Regula SecuRingRifa'i Rejal Maynando Narendra Bhati Cyber Security at Suma Soft PvtManager Cyber Security at Suma Soft PvtPune (India) Zhongquan Li @Guluisacat Yiğit Can YILMAZ @yilmazcanyigit SecuRingKirin @Pwnrin NorthSea냥냥 Halle Winkler Politepix @hallewinkler Vivek Dhar working as Assistant Sub-Inspector (RM) in Border Security Force (Frontier Headquarter BSF Kashmir) Pedro José Pereira Vieito @pvieito luckyu @uuulucky NorthSeaOm Kothawade the UNTHSC College of PharmacyOmar A. Alanis the UNTHSC College of PharmacyBistrit Dahal Matej Moravec @MacejkoMoravec K宝 LFY @secsys Smi1e yulige Cristian Dinca (icmd.tech) Arsenii Kostromin (0x3c3e) Ron Masas BreakPointJonathan Bar Or @yo_yo_yo_jbo MicrosoftBohdan Stasiuk @Bohdan_Stasiuk CVE-2024-41957 Narendra Bhati Cyber Security At Suma Soft PvtManager Cyber Security At Suma Soft PvtTashita Software Security Ron Masas Hafiizh HakTrakYoKo Kho @yokoacc HakTrakTim Michaud @TimGMichaud MoveworksAntonio Zekic @antoniozekic ant4g0nist Charly Suchanek CVE-2024-44134 Preet Dsouza (Fleming College Computer Security & Investigations Program) Domien Schepers Tim Clem Gergely Kalman @gergely_kalman Koh M. Nakagawa @tsunek0h Snoolie Keffaber @0xilis Max Thomas Holger Fuhrmannek Pedro Tôrres @t0rr3sp3dr0 CVE-2024-44130 Pwn2car Trend Micro Zero Day InitiativeClaudio Bozzato Cisco TalosFrancesco Benvenuto Cisco TalosAnton Boegler Jake Derouin (jakederouin.com) CVE-2024-44129 Kenneth Chew product-security@apple.com Joshua Keller Lukas Anamika Adhikari Om Kothawade Zaprico DigitalChi Yuan Chang ZUSO ARTtaikosoup Srijan Poudel Justin Cohen Daniele Antonioli Tuan D. Hoang Chloe Surett Abhay Kailasia @abhay_kailasia Lakshmi Narain College of Technology Bhopal India
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS, iPadOS, and watchOS | <11 | 11 |
visionOS | <2 | 2 |
tvOS | <18 | 18 |
macOS | <15 | 15 |
Safari | <18 | 18 |
Safari | <18.0 | |
iPhone OS | <18.0 | |
macOS | <15.0 | |
tvOS | <18.0 | |
visionOS | <2.0 | |
Apple iOS, iPadOS, and watchOS | <11.0 | |
Apple iOS and iPadOS | <18 | 18 |
Apple iOS, iPadOS, and macOS | <18 | 18 |
debian/webkit2gtk | <=2.44.2-1~deb11u1<=2.46.6-1~deb11u1<=2.46.6-1~deb12u1 | 2.48.0-1~deb12u1 2.48.0-1 |
debian/wpewebkit | <=2.38.6-1~deb11u1<=2.38.6-1 | 2.48.0-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2024-44192 has been classified as a medium severity vulnerability due to potential accessibility and permissions issues.
To remediate CVE-2024-44192, update your affected Apple devices to the latest available version as specified by Apple.
CVE-2024-44192 affects various Apple products including iOS, iPadOS, watchOS, visionOS, tvOS, Safari, and macOS within specific version ranges.
CVE-2024-44192 addresses accessibility concerns and permissions issues through improved data protection and state management.
There are no known workarounds for CVE-2024-44192; the recommended action is to update your devices.