CVE-2024-23296

A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 17.4 and iPadOS 17.4. An attacker with arbitrary kernel read and write capability may be able to bypass kernel memory protections. Apple is aware of a report that this issue may have been exploited.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*

History

14 Aug 2024, 19:32

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2024/Jul/20 - () http://seclists.org/fulldisclosure/2024/Jul/20 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2024/May/11 - () http://seclists.org/fulldisclosure/2024/May/11 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2024/May/13 - () http://seclists.org/fulldisclosure/2024/May/13 - Mailing List, Third Party Advisory
References () https://support.apple.com/kb/HT214100 - () https://support.apple.com/kb/HT214100 - Vendor Advisory
References () https://support.apple.com/kb/HT214107 - () https://support.apple.com/kb/HT214107 - Vendor Advisory
References () https://support.apple.com/kb/HT214118 - () https://support.apple.com/kb/HT214118 - Vendor Advisory

30 Jul 2024, 01:15

Type Values Removed Values Added
References
  • () http://seclists.org/fulldisclosure/2024/Jul/20 -

29 Jul 2024, 22:15

Type Values Removed Values Added
References
  • () https://support.apple.com/kb/HT214118 -

10 Jun 2024, 18:15

Type Values Removed Values Added
References
  • () https://support.apple.com/kb/HT214100 -

10 Jun 2024, 17:16

Type Values Removed Values Added
References
  • () http://seclists.org/fulldisclosure/2024/May/11 -
  • () http://seclists.org/fulldisclosure/2024/May/13 -
  • () https://support.apple.com/kb/HT214107 -

23 May 2024, 17:57

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2024/Mar/18 - () http://seclists.org/fulldisclosure/2024/Mar/18 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2024/Mar/21 - () http://seclists.org/fulldisclosure/2024/Mar/21 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2024/Mar/24 - () http://seclists.org/fulldisclosure/2024/Mar/24 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2024/Mar/25 - () http://seclists.org/fulldisclosure/2024/Mar/25 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2024/Mar/26 - () http://seclists.org/fulldisclosure/2024/Mar/26 - Mailing List, Third Party Advisory

13 Mar 2024, 23:15

Type Values Removed Values Added
References
  • () http://seclists.org/fulldisclosure/2024/Mar/26 -

13 Mar 2024, 22:15

Type Values Removed Values Added
References
  • () http://seclists.org/fulldisclosure/2024/Mar/24 -
  • () http://seclists.org/fulldisclosure/2024/Mar/25 -

13 Mar 2024, 21:15

Type Values Removed Values Added
References
  • () http://seclists.org/fulldisclosure/2024/Mar/18 -
  • () http://seclists.org/fulldisclosure/2024/Mar/21 -

12 Mar 2024, 17:31

Type Values Removed Values Added
CPE cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
First Time Apple macos
Apple tvos
Apple visionos
Apple watchos
References () https://support.apple.com/kb/HT214084 - () https://support.apple.com/kb/HT214084 - Vendor Advisory
References () https://support.apple.com/kb/HT214086 - () https://support.apple.com/kb/HT214086 - Vendor Advisory
References () https://support.apple.com/kb/HT214087 - () https://support.apple.com/kb/HT214087 - Vendor Advisory
References () https://support.apple.com/kb/HT214088 - () https://support.apple.com/kb/HT214088 - Vendor Advisory

07 Mar 2024, 19:15

Type Values Removed Values Added
References
  • () https://support.apple.com/kb/HT214084 -
  • () https://support.apple.com/kb/HT214086 -
  • () https://support.apple.com/kb/HT214087 -
  • () https://support.apple.com/kb/HT214088 -

07 Mar 2024, 17:52

Type Values Removed Values Added
CWE CWE-787
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Apple ipad Os
Apple
Apple iphone Os
CPE cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*
References () https://support.apple.com/en-us/HT214081 - () https://support.apple.com/en-us/HT214081 - Vendor Advisory

06 Mar 2024, 15:18

Type Values Removed Values Added
Summary
  • (es) Se solucionó un problema de corrupción de memoria con una validación mejorada. Este problema se solucionó en iOS 17.4 y iPadOS 17.4. Un atacante con capacidad arbitraria de lectura y escritura del kernel puede eludir las protecciones de la memoria del kernel. Apple tiene conocimiento de un informe que indica que este problema puede haber sido aprovechado.

05 Mar 2024, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-05 20:16

Updated : 2024-08-14 19:32


NVD link : CVE-2024-23296

Mitre link : CVE-2024-23296

CVE.ORG link : CVE-2024-23296


JSON object : View

Products Affected

apple

  • ipad_os
  • macos
  • watchos
  • tvos
  • iphone_os
  • visionos
CWE
CWE-787

Out-of-bounds Write