First published: Mon Oct 28 2024(Updated: )
Accessibility. The issue was addressed with improved authentication.
Credit: product-security@apple.com Junsung Lee Trend Micro Zero Day InitiativeJex Amro Zhongquan Li @Guluisacat Mickey Jin @patch1t Wang Yu CyberservalYe Zhang @VAR10CK Baidu Securityan anonymous researcher Mateusz Krzywicki @krzywix Garrett Moon Excited Pixel LLCArsenii Kostromin (0x3c3e) Ben Roeder Toomas Römer Jaime Bertran Kirin @Pwnrin Noah Gregory (wts.dev) 7feilee Un3xploitable CW Research IncBohdan Stasiuk @Bohdan_Stasiuk CW Research IncPedro Tôrres @t0rr3sp3dr0 Mickey Jin @patch1t KandjiCsaba Fitzl @theevilbit Kandjian anonymous researcher Dawn Security Lab of JDYinyi Wu @_3ndy1 Dawn Security Lab of JDNarendra Bhati Cyber Security at Suma Soft PvtManager Cyber Security at Suma Soft PvtPune (India) Lucas Di Tomase Ryan Dowd @_rdowd Gergely Kalman @gergely_kalman Csaba Fitzl @theevilbit Michael DePlante @izobashi Trend Micro Zero Day InitiativeHalle Winkler Politepix (theoffcuts.org) Bing Shi Alibaba GroupWenchao Li Alibaba GroupXiaolong Bai Alibaba Group Indiana University BloomingtonLuyi Xing Indiana University BloomingtonHossein Lotfi @hosselot Trend Micro Zero Day Initiativedw0r! Trend Micro Zero Day InitiativeRodolphe Brunetti @eisw0lf Cristian Dinca (icmd.tech) Wojciech Regula SecuRingQ1IQ @q1iqF P1umer @p1umer Bohdan Stasiuk @Bohdan_Stasiuk Ivan Fratric Google Project ZeroK宝 @Pwnrin pattern-f @pattern_F_ Loadshine LabHikerell Loadshine LabAlexandre Bedard Ronny Stiftel Ziyi Zhou Jiao Tong University) @Shanghai Tianxiao Hou Jiao Tong University) @Shanghai Hichem Maloufi Christian Mina Ismail Amzdak Nimrat Khalsa Davis Dai James Gill @infosec.exchange) @jjtech Bistrit Dahal Kenneth Chew Abhay Kailasia @abhay_kailasia Lakshmi Narain College of Technology Bhopal IndiaSrijan Poudel Rizki Maulana (rmrizki.my.id) Dalibor Milanovic Richard Hyunho Im with Route Zero Security @richeeta Braylon @softwarescool Matthew Butler Jake Derouin CVE-2024-39573 CVE-2024-38477 CVE-2024-38476
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS Sequoia | <15.1 | 15.1 |
Apple iOS, iPadOS, and watchOS | <18.1 | 18.1 |
Apple iOS, iPadOS, and watchOS | <18.1 | 18.1 |
Apple iOS, iPadOS, and watchOS | <18.1 | |
iStyle @cosme iPhone OS | <18.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2024-44242 is classified as a vulnerability affecting authentication mechanisms in various Apple operating systems.
To mitigate CVE-2024-44242, upgrade to the latest versions of macOS Sequoia, iOS, or iPadOS as specified by the vendor.
CVE-2024-44242 affects Apple macOS Sequoia up to version 15.1 and iOS and iPadOS up to version 18.1.
CVE-2024-44242 addresses a path handling issue related to accessibility and improved authentication.
Yes, CVE-2024-44242 was assigned by a third party, indicating it is an externally identified vulnerability.