First published: Wed Dec 11 2024(Updated: )
A configuration issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15.2. An app may be able to modify protected parts of the file system.
Credit: Rodolphe BRUNETTI @eisw0lf Lupus NovaKirin @Pwnrin 7feilee Hossein Lotfi @hosselot Trend Micro Zero Day InitiativeArsenii Kostromin (0x3c3e) Gary Kwong Anonymous Trend Micro Zero Day InitiativeJunsung Lee Trend Micro Zero Day InitiativeYe Zhang @VAR10CK Baidu Securityan anonymous researcher Joseph Ravichandran @0xjprx MIT CSAILsohybbyk Hyerean Jang Taehun Kim Youngjoo Shin CVE-2024-45490 风沐云烟 @binary_fmyy Meng Zhang (鲸落) NorthSeaClaudio Bozzato Cisco TalosFrancesco Benvenuto Cisco Talos神罚 @Pwnrin Mickey Jin @patch1t Bohdan Stasiuk @Bohdan_Stasiuk Abhay Kailasia @abhay_kailasia CRakeshkumar Talaviya Talal Haj Bakry Mysk IncTommy Mysk @mysk_co Mysk IncJacob Braun Rei @reizydev Kenneth Chew Michael DePlante @izobashi Trend Micro's Zero Day InitiativeYokesh Muthu K Mickey Jin @patch1t MicrosoftJonathan Bar Or @yo_yo_yo_jbo MicrosoftAmy @asentientbot Rodolphe BRUNETTI @eisw0lf CVE-2024-45306 Seunghyun Lee Brendon Tiszka Google Project Zerolinjy HKUS3Labchluo WHUSecLabXiangwei Zhang Tencent Security YUNDING LABTashita Software Security Lukas Bernhard Halle Winkler Politepix theoffcuts.org Trent Lloyd @lathiat D’Angelo Gonzalez CrowdStrikeSmi1e @Smi1eSEC Michael Cohen Mickey Jin @patch1t KandjiCsaba Fitzl @theevilbit KandjiD4m0n CertiK SkyFall Team Dillon Franke Google Project ZeroBenjamin Hornbeck ZUSO ARTSkadz @skadz108 ZUSO ARTChi Yuan Chang ZUSO ARTtaikosoup Wang Yu CyberservalGoogle Threat Analysis Group Desmond Trend Micro Zero Day InitiativePwn2car & Rotiple(HyeongSeok Jang) Trend Micro Zero Day InitiativeJoshua Jones DongJun Kim @smlijun JongSeong Kim in Enki WhiteHat @nevul37 pattern-f @pattern_F_ 云散 Pedro Tôrres @t0rr3sp3dr0 Yiğit Can YILMAZ @yilmazcanyigit Michael DePlante @izobashi Trend Micro Zero Day InitiativeZhongquan Li @Guluisacat Yann GASCUEL Alter SolutionsAdam M. PixiePoint Security Minghao Lin @Y1nKoc Zhejiang Universitybabywu Zhejiang University Zhejiang UniversityXingwei Lin Zhejiang UniversityUri Katz (Oligo Security) product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS | <14.7.3 | 14.7.3 |
Apple iOS and macOS | >=15.0<15.2 | |
macOS | <15.2 | 15.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2024-44243 is considered a high severity vulnerability due to its ability to allow unauthorized modification of protected parts of the file system.
To fix CVE-2024-44243, upgrade to macOS Sequoia version 15.2 or later.
CVE-2024-44243 affects macOS Sequoia versions prior to 15.2 and macOS Sonoma versions up to 14.7.3.
CVE-2024-44243 is a configuration issue that potentially allows applications to manipulate protected sections of the file system.
Yes, exploiting CVE-2024-44243 usually requires physical access to the affected device.