CVE-2024-27826

The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.6.8, macOS Sonoma 14.5, macOS Monterey 12.7.6, watchOS 10.5, visionOS 1.3, tvOS 17.5, iOS 17.5 and iPadOS 17.5. An app may be able to execute arbitrary code with kernel privileges.
References
Link Resource
http://seclists.org/fulldisclosure/2024/Jul/19 Mailing List
http://seclists.org/fulldisclosure/2024/Jul/20 Mailing List
http://seclists.org/fulldisclosure/2024/Jul/23 Mailing List
https://support.apple.com/en-us/HT214101 Vendor Advisory
https://support.apple.com/en-us/HT214102 Vendor Advisory
https://support.apple.com/en-us/HT214104 Vendor Advisory
https://support.apple.com/en-us/HT214106 Vendor Advisory
https://support.apple.com/en-us/HT214118 Vendor Advisory
https://support.apple.com/en-us/HT214120 Vendor Advisory
https://support.apple.com/en-us/HT214123 Vendor Advisory
https://support.apple.com/kb/HT214101 Vendor Advisory
https://support.apple.com/kb/HT214102 Vendor Advisory
https://support.apple.com/kb/HT214104 Vendor Advisory
https://support.apple.com/kb/HT214106 Vendor Advisory
http://seclists.org/fulldisclosure/2024/Jul/19 Mailing List
http://seclists.org/fulldisclosure/2024/Jul/20 Mailing List
http://seclists.org/fulldisclosure/2024/Jul/23 Mailing List
https://support.apple.com/en-us/HT214101 Vendor Advisory
https://support.apple.com/en-us/HT214102 Vendor Advisory
https://support.apple.com/en-us/HT214104 Vendor Advisory
https://support.apple.com/en-us/HT214106 Vendor Advisory
https://support.apple.com/en-us/HT214118 Vendor Advisory
https://support.apple.com/en-us/HT214120 Vendor Advisory
https://support.apple.com/en-us/HT214123 Vendor Advisory
https://support.apple.com/kb/HT214101 Vendor Advisory
https://support.apple.com/kb/HT214102 Vendor Advisory
https://support.apple.com/kb/HT214104 Vendor Advisory
https://support.apple.com/kb/HT214106 Vendor Advisory
https://support.apple.com/kb/HT214118
https://support.apple.com/kb/HT214120
https://support.apple.com/kb/HT214123
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*

History

04 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://support.apple.com/kb/HT214118 -
  • () https://support.apple.com/kb/HT214120 -
  • () https://support.apple.com/kb/HT214123 -

Information

Published : 2024-07-29 23:15

Updated : 2025-11-04 18:16


NVD link : CVE-2024-27826

Mitre link : CVE-2024-27826

CVE.ORG link : CVE-2024-27826


JSON object : View

Products Affected

apple

  • watchos
  • visionos
  • ipados
  • iphone_os
  • tvos
  • macos
CWE
NVD-CWE-noinfo CWE-269

Improper Privilege Management