CVE-2024-27823

A race condition was addressed with improved locking. This issue is fixed in iOS 16.7.8 and iPadOS 16.7.8, iOS 17.5 and iPadOS 17.5, macOS Monterey 12.7.5, macOS Sonoma 14.5, macOS Ventura 13.6.7, tvOS 17.5, visionOS 1.3, watchOS 10.5. An attacker in a privileged network position may be able to spoof network packets.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*

History

02 Apr 2026, 19:17

Type Values Removed Values Added
Summary (en) A race condition was addressed with improved locking. This issue is fixed in macOS Sonoma 14.5, iOS 16.7.8 and iPadOS 16.7.8, macOS Ventura 13.6.7, watchOS 10.5, visionOS 1.3, tvOS 17.5, iOS 17.5 and iPadOS 17.5, macOS Monterey 12.7.5. An attacker in a privileged network position may be able to spoof network packets. (en) A race condition was addressed with improved locking. This issue is fixed in iOS 16.7.8 and iPadOS 16.7.8, iOS 17.5 and iPadOS 17.5, macOS Monterey 12.7.5, macOS Sonoma 14.5, macOS Ventura 13.6.7, tvOS 17.5, visionOS 1.3, watchOS 10.5. An attacker in a privileged network position may be able to spoof network packets.
References
  • () https://support.apple.com/en-us/120898 -
  • () https://support.apple.com/en-us/120899 -
  • () https://support.apple.com/en-us/120900 -
  • () https://support.apple.com/en-us/120901 -
  • () https://support.apple.com/en-us/120902 -
  • () https://support.apple.com/en-us/120903 -
  • () https://support.apple.com/en-us/120905 -
  • () https://support.apple.com/en-us/120915 -

04 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://support.apple.com/kb/HT214123 -

21 Nov 2024, 09:05

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2024/Jul/23 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2024/Jul/23 - Mailing List, Third Party Advisory
References () https://support.apple.com/en-us/HT214100 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT214100 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT214101 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT214101 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT214102 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT214102 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT214104 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT214104 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT214105 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT214105 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT214106 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT214106 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT214107 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT214107 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT214123 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT214123 - Release Notes, Vendor Advisory
References () https://support.apple.com/kb/HT214100 - Release Notes, Vendor Advisory () https://support.apple.com/kb/HT214100 - Release Notes, Vendor Advisory
References () https://support.apple.com/kb/HT214101 - Release Notes, Vendor Advisory () https://support.apple.com/kb/HT214101 - Release Notes, Vendor Advisory
References () https://support.apple.com/kb/HT214102 - Release Notes, Vendor Advisory () https://support.apple.com/kb/HT214102 - Release Notes, Vendor Advisory
References () https://support.apple.com/kb/HT214104 - Release Notes, Vendor Advisory () https://support.apple.com/kb/HT214104 - Release Notes, Vendor Advisory
References () https://support.apple.com/kb/HT214105 - Release Notes, Vendor Advisory () https://support.apple.com/kb/HT214105 - Release Notes, Vendor Advisory
References () https://support.apple.com/kb/HT214106 - Release Notes, Vendor Advisory () https://support.apple.com/kb/HT214106 - Release Notes, Vendor Advisory
References () https://support.apple.com/kb/HT214107 - Release Notes, Vendor Advisory () https://support.apple.com/kb/HT214107 - Release Notes, Vendor Advisory

12 Aug 2024, 15:33

Type Values Removed Values Added
CWE CWE-362
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.9
First Time Apple visionos
Apple
Apple ipados
Apple tvos
Apple watchos
Apple iphone Os
Apple macos
CPE cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
References () http://seclists.org/fulldisclosure/2024/Jul/23 - () http://seclists.org/fulldisclosure/2024/Jul/23 - Mailing List, Third Party Advisory
References () https://support.apple.com/en-us/HT214100 - () https://support.apple.com/en-us/HT214100 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT214101 - () https://support.apple.com/en-us/HT214101 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT214102 - () https://support.apple.com/en-us/HT214102 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT214104 - () https://support.apple.com/en-us/HT214104 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT214105 - () https://support.apple.com/en-us/HT214105 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT214106 - () https://support.apple.com/en-us/HT214106 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT214107 - () https://support.apple.com/en-us/HT214107 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT214123 - () https://support.apple.com/en-us/HT214123 - Release Notes, Vendor Advisory
References () https://support.apple.com/kb/HT214100 - () https://support.apple.com/kb/HT214100 - Release Notes, Vendor Advisory
References () https://support.apple.com/kb/HT214101 - () https://support.apple.com/kb/HT214101 - Release Notes, Vendor Advisory
References () https://support.apple.com/kb/HT214102 - () https://support.apple.com/kb/HT214102 - Release Notes, Vendor Advisory
References () https://support.apple.com/kb/HT214104 - () https://support.apple.com/kb/HT214104 - Release Notes, Vendor Advisory
References () https://support.apple.com/kb/HT214105 - () https://support.apple.com/kb/HT214105 - Release Notes, Vendor Advisory
References () https://support.apple.com/kb/HT214106 - () https://support.apple.com/kb/HT214106 - Release Notes, Vendor Advisory
References () https://support.apple.com/kb/HT214107 - () https://support.apple.com/kb/HT214107 - Release Notes, Vendor Advisory

30 Jul 2024, 13:32

Type Values Removed Values Added
Summary
  • (es) Se solucionó una condición de ejecucióncon un bloqueo mejorado. Este problema se solucionó en macOS Sonoma 14.5, iOS 16.7.8 y iPadOS 16.7.8, macOS Ventura 13.6.7, watchOS 10.5, visionOS 1.3, tvOS 17.5, iOS 17.5 y iPadOS 17.5, macOS Monterey 12.7.5. Un atacante en una posición privilegiada de la red puede falsificar paquetes de red.

30 Jul 2024, 09:15

Type Values Removed Values Added
References
  • () https://support.apple.com/kb/HT214100 -
  • () https://support.apple.com/kb/HT214101 -
  • () https://support.apple.com/kb/HT214102 -
  • () https://support.apple.com/kb/HT214104 -
  • () https://support.apple.com/kb/HT214105 -
  • () https://support.apple.com/kb/HT214106 -
  • () https://support.apple.com/kb/HT214107 -

30 Jul 2024, 01:15

Type Values Removed Values Added
References
  • () http://seclists.org/fulldisclosure/2024/Jul/23 -

29 Jul 2024, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-29 23:15

Updated : 2026-04-02 19:17


NVD link : CVE-2024-27823

Mitre link : CVE-2024-27823

CVE.ORG link : CVE-2024-27823


JSON object : View

Products Affected

apple

  • watchos
  • iphone_os
  • visionos
  • tvos
  • ipados
  • macos
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')