This issue was addressed through improved state management. This issue is fixed in iOS 17.7.1 and iPadOS 17.7.1, visionOS 2.1, iOS 18.1 and iPadOS 18.1, macOS Sequoia 15.1, Safari 18.1. An attacker may be able to misuse a trust relationship to download malicious content.
References
Link | Resource |
---|---|
https://support.apple.com/en-us/121563 | Vendor Advisory |
https://support.apple.com/en-us/121564 | Vendor Advisory |
https://support.apple.com/en-us/121566 | Vendor Advisory |
https://support.apple.com/en-us/121567 | Vendor Advisory |
https://support.apple.com/en-us/121571 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
11 Dec 2024, 18:29
Type | Values Removed | Values Added |
---|---|---|
First Time |
Apple macos
Apple ipados Apple iphone Os Apple safari Apple Apple visionos |
|
CWE | NVD-CWE-noinfo | |
References | () https://support.apple.com/en-us/121563 - Vendor Advisory | |
References | () https://support.apple.com/en-us/121564 - Vendor Advisory | |
References | () https://support.apple.com/en-us/121566 - Vendor Advisory | |
References | () https://support.apple.com/en-us/121567 - Vendor Advisory | |
References | () https://support.apple.com/en-us/121571 - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CPE | cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:* |
Information
Published : 2024-10-28 21:15
Updated : 2024-12-11 18:29
NVD link : CVE-2024-44259
Mitre link : CVE-2024-44259
CVE.ORG link : CVE-2024-44259
JSON object : View
Products Affected
apple
- safari
- iphone_os
- ipados
- visionos
- macos
CWE