CVE-2024-27863

An information disclosure issue was addressed with improved private data redaction for log entries. This issue is fixed in iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. A local attacker may be able to determine kernel memory layout.
References
Link Resource
http://seclists.org/fulldisclosure/2024/Jul/16 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2024/Jul/18 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2024/Jul/21 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2024/Jul/22 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2024/Jul/23 Mailing List Third Party Advisory
https://support.apple.com/en-us/HT214117 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT214119 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT214122 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT214123 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT214124 Release Notes Vendor Advisory
http://seclists.org/fulldisclosure/2024/Jul/16 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2024/Jul/18 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2024/Jul/21 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2024/Jul/22 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2024/Jul/23 Mailing List Third Party Advisory
https://support.apple.com/en-us/HT214117 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT214119 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT214122 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT214123 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT214124 Release Notes Vendor Advisory
https://support.apple.com/kb/HT214117
https://support.apple.com/kb/HT214119
https://support.apple.com/kb/HT214122
https://support.apple.com/kb/HT214123
https://support.apple.com/kb/HT214124
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*

History

04 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://support.apple.com/kb/HT214117 -
  • () https://support.apple.com/kb/HT214119 -
  • () https://support.apple.com/kb/HT214122 -
  • () https://support.apple.com/kb/HT214123 -
  • () https://support.apple.com/kb/HT214124 -

Information

Published : 2024-07-29 23:15

Updated : 2025-11-04 18:16


NVD link : CVE-2024-27863

Mitre link : CVE-2024-27863

CVE.ORG link : CVE-2024-27863


JSON object : View

Products Affected

apple

  • watchos
  • visionos
  • iphone_os
  • tvos
  • macos
  • ipados