A race condition was addressed with additional validation. This issue is fixed in macOS Ventura 13.6.8, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, macOS Sonoma 14.6. A malicious attacker with arbitrary read and write capability may be able to bypass Pointer Authentication.
References
Configurations
Configuration 1 (hide)
|
History
13 Mar 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-352 |
21 Nov 2024, 09:31
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2024/Jul/16 - Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2024/Jul/18 - Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2024/Jul/19 - Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2024/Jul/21 - Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2024/Jul/22 - Mailing List, Third Party Advisory | |
References | () https://support.apple.com/en-us/HT214117 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214119 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214120 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214122 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214124 - Release Notes, Vendor Advisory |
15 Aug 2024, 16:14
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* |
|
CWE | CWE-362 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
First Time |
Apple
Apple ipados Apple tvos Apple watchos Apple iphone Os Apple macos |
|
References | () http://seclists.org/fulldisclosure/2024/Jul/16 - Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2024/Jul/18 - Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2024/Jul/19 - Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2024/Jul/21 - Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2024/Jul/22 - Mailing List, Third Party Advisory | |
References | () https://support.apple.com/en-us/HT214117 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214119 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214120 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214122 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/en-us/HT214124 - Release Notes, Vendor Advisory |
30 Jul 2024, 13:32
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
30 Jul 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
30 Jul 2024, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
29 Jul 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-29 23:15
Updated : 2025-03-13 19:15
NVD link : CVE-2024-40815
Mitre link : CVE-2024-40815
CVE.ORG link : CVE-2024-40815
JSON object : View
Products Affected
apple
- watchos
- iphone_os
- ipados
- macos
- tvos