First published: Mon Oct 28 2024(Updated: )
An out-of-bounds read was addressed with improved input validation. This issue is fixed in tvOS 18.1, iOS 18.1 and iPadOS 18.1, iOS 17.7.1 and iPadOS 17.7.1, macOS Ventura 13.7.1, macOS Sonoma 14.7.1, watchOS 11.1, visionOS 2.1. Parsing a file may lead to disclosure of user information.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPadOS | <17.7.1 | |
Apple iPadOS | >=18.0<18.1 | |
Apple iPhone OS | <17.7.1 | |
Apple iPhone OS | >=18.0<18.1 | |
Apple macOS | <13.7.1 | |
Apple macOS | >=14.0<14.7.1 | |
Apple tvOS | <18.1 | |
Apple visionOS | <2.1 | |
Apple watchOS | <11.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-44282 is considered a significant security vulnerability due to the potential disclosure of user information.
To remediate CVE-2024-44282, update your devices to tvOS 18.1, iOS 18.1, iPadOS 18.1, macOS Ventura 13.7.1, or the latest versions of affected Apple operating systems.
CVE-2024-44282 affects various Apple devices including iPhones, iPads, Macs, Apple TVs, Apple Watches, and VisionOS devices.
CVE-2024-44282 involves an out-of-bounds read which may lead to the disclosure of user information during file parsing.
Keeping your Apple devices updated with the latest software versions is the best way to protect against CVE-2024-44282.