A race condition was addressed with improved locking. This issue is fixed in macOS Sonoma 14.5, iOS 16.7.8 and iPadOS 16.7.8, macOS Ventura 13.6.7, watchOS 10.5, visionOS 1.3, tvOS 17.5, iOS 17.5 and iPadOS 17.5, macOS Monterey 12.7.5. An attacker in a privileged network position may be able to spoof network packets.
References
Configurations
Configuration 1 (hide)
|
History
12 Aug 2024, 15:33
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2024/Jul/23 - Mailing List, Third Party Advisory | |
References | () https://support.apple.com/en-us/HT214100 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214101 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214102 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214104 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214105 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214106 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214107 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214123 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/kb/HT214100 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/kb/HT214101 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/kb/HT214102 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/kb/HT214104 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/kb/HT214105 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/kb/HT214106 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/kb/HT214107 - Release Notes, Vendor Advisory | |
CWE | CWE-362 | |
CPE | cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:* cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.9 |
First Time |
Apple visionos
Apple ipados Apple watchos Apple macos Apple iphone Os Apple Apple tvos |
30 Jul 2024, 13:32
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
30 Jul 2024, 09:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
30 Jul 2024, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
29 Jul 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-29 23:15
Updated : 2024-08-12 15:33
NVD link : CVE-2024-27823
Mitre link : CVE-2024-27823
CVE.ORG link : CVE-2024-27823
JSON object : View
Products Affected
apple
- iphone_os
- ipados
- macos
- visionos
- watchos
- tvos
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')