First published: Wed Dec 11 2024(Updated: )
A logic issue was addressed with improved file handling. This issue is fixed in macOS Sequoia 15.2, macOS Ventura 13.7.2, macOS Sonoma 14.7.2. A malicious app may be able to gain root privileges.
Credit: product-security@apple.com Dillon Franke Google Project Zeroan anonymous researcher Michael Cohen D’Angelo Gonzalez CrowdStrikeRodolphe BRUNETTI @eisw0lf Lupus NovaHossein Lotfi @hosselot Trend Micro Zero Day InitiativeJunsung Lee Trend Micro Zero Day Initiativesohybbyk Joseph Ravichandran @0xjprx MIT CSAILBen Roeder CVE-2024-45490 风沐云烟 @binary_fmyy Mickey Jin @patch1t Bohdan Stasiuk @Bohdan_Stasiuk Michael DePlante @izobashi Trend Micro's Zero Day InitiativeHalle Winkler Politepix (theoffcuts.org) Arsenii Kostromin (0x3c3e) Amy @asentientbot Rodolphe BRUNETTI @eisw0lf Kirin @Pwnrin CVE-2024-45306 Politepix theoffcuts.org Trent Lloyd @lathiat Benjamin Hornbeck ZUSO ARTSkadz @skadz108 ZUSO ARTChi Yuan Chang ZUSO ARTtaikosoup Mickey Jin @patch1t KandjiCsaba Fitzl @theevilbit Kandji7feilee Gary Kwong Anonymous Trend Micro Zero Day InitiativeYe Zhang @VAR10CK Baidu SecurityHyerean Jang Taehun Kim Youngjoo Shin Meng Zhang (鲸落) NorthSeaClaudio Bozzato Cisco TalosFrancesco Benvenuto Cisco Talos神罚 @Pwnrin Abhay Kailasia @abhay_kailasia CRakeshkumar Talaviya Talal Haj Bakry Mysk IncTommy Mysk @mysk_co Mysk IncJacob Braun Rei @reizydev Kenneth Chew Yokesh Muthu K Mickey Jin @patch1t MicrosoftJonathan Bar Or @yo_yo_yo_jbo MicrosoftSeunghyun Lee Brendon Tiszka Google Project Zerolinjy HKUS3Labchluo WHUSecLabXiangwei Zhang Tencent Security YUNDING LABTashita Software Security Lukas Bernhard D4m0n CertiK SkyFall Team Smi1e @Smi1eSEC
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS | >=13.0<13.7.2 | |
Apple macOS | >=14.0<14.7.2 | |
Apple macOS | >=15.0<15.2 | |
Apple macOS | <13.7.2 | 13.7.2 |
Apple macOS Sequoia | <15.2 | 15.2 |
Apple macOS | <14.7.2 | 14.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2024-44291 has a high severity rating due to the potential for malicious applications to gain root privileges on affected macOS systems.
To fix CVE-2024-44291, update your macOS to either macOS Sequoia 15.2, macOS Ventura 13.7.2, or macOS Sonoma 14.7.2.
CVE-2024-44291 affects macOS versions from 13.0 to 13.7.2, 14.0 to 14.7.2, and 15.0 to 15.2.
CVE-2024-44291 is categorized as a logic issue that was addressed through improved file handling.
Yes, due to its ability to grant root privileges to malicious applications, CVE-2024-44291 could potentially lead to data breaches.