CVE-2024-23278

The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.6.5, macOS Sonoma 14.4, iOS 17.4 and iPadOS 17.4, watchOS 10.4, iOS 16.7.6 and iPadOS 16.7.6, tvOS 17.4. An app may be able to break out of its sandbox.
References
Link Resource
http://seclists.org/fulldisclosure/2024/Mar/21 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2024/Mar/22 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2024/Mar/24 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2024/Mar/25 Mailing List Third Party Advisory
https://support.apple.com/en-us/HT214081 Vendor Advisory
https://support.apple.com/en-us/HT214082 Vendor Advisory
https://support.apple.com/en-us/HT214084 Vendor Advisory
https://support.apple.com/en-us/HT214085 Vendor Advisory
https://support.apple.com/en-us/HT214086 Vendor Advisory
https://support.apple.com/en-us/HT214088 Vendor Advisory
https://support.apple.com/kb/HT214085 Vendor Advisory
http://seclists.org/fulldisclosure/2024/Mar/21 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2024/Mar/22 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2024/Mar/24 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2024/Mar/25 Mailing List Third Party Advisory
https://support.apple.com/en-us/HT214081 Vendor Advisory
https://support.apple.com/en-us/HT214082 Vendor Advisory
https://support.apple.com/en-us/HT214084 Vendor Advisory
https://support.apple.com/en-us/HT214085 Vendor Advisory
https://support.apple.com/en-us/HT214086 Vendor Advisory
https://support.apple.com/en-us/HT214088 Vendor Advisory
https://support.apple.com/kb/HT214081
https://support.apple.com/kb/HT214082
https://support.apple.com/kb/HT214084
https://support.apple.com/kb/HT214085 Vendor Advisory
https://support.apple.com/kb/HT214086
https://support.apple.com/kb/HT214088
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*

History

04 Nov 2025, 19:16

Type Values Removed Values Added
References
  • () https://support.apple.com/kb/HT214081 -
  • () https://support.apple.com/kb/HT214082 -
  • () https://support.apple.com/kb/HT214084 -
  • () https://support.apple.com/kb/HT214086 -
  • () https://support.apple.com/kb/HT214088 -

Information

Published : 2024-03-08 02:15

Updated : 2025-11-04 19:16


NVD link : CVE-2024-23278

Mitre link : CVE-2024-23278

CVE.ORG link : CVE-2024-23278


JSON object : View

Products Affected

apple

  • watchos
  • ipados
  • iphone_os
  • tvos
  • macos
CWE
NVD-CWE-noinfo CWE-94

Improper Control of Generation of Code ('Code Injection')