Apple Products Multiple Vulnerabilities
RISK: Medium Risk
TYPE: Operating Systems - Mobile & Apps
Multiple vulnerabilities were identified in Apple Products. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, remote code execution, elevation of privilege, spoofing, sensitive information disclosure, data manipulation and security restriction bypass on the targeted system.
Note:
For CVE-2024-23225 and CVE-2024-23296, an attacker with arbitrary kernel read and write capability may be able to bypass kernel memory protections. Apple is aware of a report that this issue may have been exploited.
To expolit these vulnerabilities, attackers need arbitrary kernel read and write capability. Hence, the risk level is rated to Medium Risk.
[Updated on 2024-03-08]
Updated System / Technologies affected, Solutions, Vulnerability Identifier and Related Links.
Impact
- Information Disclosure
- Security Restriction Bypass
- Data Manipulation
- Denial of Service
- Remote Code Execution
- Elevation of Privilege
- Spoofing
System / Technologies affected
- Versions prior to iOS 16.7.6 and iPadOS 16.7.6
- Versions prior to iOS 17.4 and iPadOS 17.4
- Versions prior to Safari 17.4
- Versions prior to macOS Monterey 12.7.4
- Versions prior to macOS Ventura 13.6.5
- Versions prior to macOS Sonoma 14.4
- Versions prior to watchOS 10.4
- Versions prior to tvOS 17.4
- Versions prior to visionOS 1.1
Solutions
Before installation of the software, please visit the vendor web-site for more details.
Apply fixes issued by the vendor:
- iOS 16.7.6 and iPadOS 16.7.6
- iOS 17.4 and iPadOS 17.4
- Safari 17.4
- macOS Monterey 12.7.4
- macOS Ventura 13.6.5
- macOS Sonoma 14.4
- watchOS 10.4
- tvOS 17.4
- visionOS 1.1
Vulnerability Identifier
- CVE-2022-42816
- CVE-2022-48554
- CVE-2023-28826
- CVE-2023-42853
- CVE-2023-48795
- CVE-2023-51384
- CVE-2023-51385
- CVE-2024-0258
- CVE-2024-23201
- CVE-2024-23203
- CVE-2024-23204
- CVE-2024-23205
- CVE-2024-23216
- CVE-2024-23217
- CVE-2024-23218
- CVE-2024-23220
- CVE-2024-23225
- CVE-2024-23226
- CVE-2024-23227
- CVE-2024-23230
- CVE-2024-23231
- CVE-2024-23232
- CVE-2024-23233
- CVE-2024-23234
- CVE-2024-23235
- CVE-2024-23238
- CVE-2024-23239
- CVE-2024-23240
- CVE-2024-23241
- CVE-2024-23242
- CVE-2024-23243
- CVE-2024-23244
- CVE-2024-23245
- CVE-2024-23246
- CVE-2024-23247
- CVE-2024-23248
- CVE-2024-23249
- CVE-2024-23250
- CVE-2024-23252
- CVE-2024-23253
- CVE-2024-23254
- CVE-2024-23255
- CVE-2024-23256
- CVE-2024-23257
- CVE-2024-23258
- CVE-2024-23259
- CVE-2024-23260
- CVE-2024-23262
- CVE-2024-23263
- CVE-2024-23264
- CVE-2024-23265
- CVE-2024-23266
- CVE-2024-23267
- CVE-2024-23268
- CVE-2024-23269
- CVE-2024-23270
- CVE-2024-23272
- CVE-2024-23273
- CVE-2024-23274
- CVE-2024-23275
- CVE-2024-23276
- CVE-2024-23277
- CVE-2024-23278
- CVE-2024-23279
- CVE-2024-23280
- CVE-2024-23281
- CVE-2024-23283
- CVE-2024-23284
- CVE-2024-23285
- CVE-2024-23286
- CVE-2024-23287
- CVE-2024-23288
- CVE-2024-23289
- CVE-2024-23290
- CVE-2024-23291
- CVE-2024-23292
- CVE-2024-23293
- CVE-2024-23294
- CVE-2024-23295
- CVE-2024-23296
- CVE-2024-23297
Source
Related Link
- https://support.apple.com/en-us/HT214081
- https://support.apple.com/en-us/HT214082
- https://support.apple.com/en-us/HT214083
- https://support.apple.com/en-us/HT214084
- https://support.apple.com/en-us/HT214085
- https://support.apple.com/en-us/HT214086
- https://support.apple.com/en-us/HT214087
- https://support.apple.com/en-us/HT214088
- https://support.apple.com/en-us/HT214089
Related Tags
Share with