CVE-2024-23201
Summary
| CVE | CVE-2024-23201 |
|---|---|
| State | PUBLISHED |
| Assigner | apple |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2024-03-08 02:15:47 UTC |
| Updated | 2026-04-02 19:16:53 UTC |
| Description | A permissions issue was addressed with additional restrictions. This issue is fixed in iOS 17.3 and iPadOS 17.3, macOS Monterey 12.7.4, macOS Sonoma 14.3, macOS Ventura 13.6.5, tvOS 17.3, watchOS 10.3. An app may be able to cause a denial-of-service. |
Risk And Classification
Primary CVSS: v3.1 5.5 MEDIUM from [email protected]
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Problem Types: CWE-276 | An app may be able to cause a denial-of-service | CWE-276 CWE-276 Incorrect Default Permissions
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Primary | 5.5 | MEDIUM | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
| 3.1 | ADP | DECLARED | 6.2 | MEDIUM | CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
| 3.1 | 134c704f-9b21-4f2e-91b3-4a467353bcc0 | Secondary | 6.2 | MEDIUM | CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
CVSS v3.1 Breakdown
Attack Vector
LocalAttack Complexity
LowPrivileges Required
NoneUser Interaction
RequiredScope
UnchangedConfidentiality
NoneIntegrity
NoneAvailability
HighCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
NVD Known Affected Configurations (CPE 2.3)
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Apple | IOS And IPadOS | affected 17.3 custom | Not specified |
| CNA | Apple | MacOS | affected 12.7.4 custom | Not specified |
| CNA | Apple | MacOS | affected 13.6.5 custom | Not specified |
| CNA | Apple | MacOS | affected 14.3 custom | Not specified |
| CNA | Apple | TvOS | affected 17.3 custom | Not specified |
| CNA | Apple | WatchOS | affected 10.3 custom | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| support.apple.com/kb/HT214085 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | |
| support.apple.com/en-us/HT214085 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | Vendor Advisory |
| support.apple.com/en-us/HT214055 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | Vendor Advisory |
| support.apple.com/en-us/120306 | [email protected] | support.apple.com | |
| support.apple.com/kb/HT214060 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | Vendor Advisory |
| support.apple.com/en-us/120304 | [email protected] | support.apple.com | |
| support.apple.com/en-us/120309 | [email protected] | support.apple.com | |
| support.apple.com/kb/HT214055 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | Vendor Advisory |
| support.apple.com/kb/HT214083 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | |
| support.apple.com/en-us/HT214083 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | Vendor Advisory |
| support.apple.com/kb/HT214059 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | Vendor Advisory |
| support.apple.com/en-us/120884 | [email protected] | support.apple.com | |
| support.apple.com/kb/HT214061 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | Vendor Advisory |
| seclists.org/fulldisclosure/2024/Mar/22 | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | Mailing List |
| support.apple.com/en-us/120886 | [email protected] | support.apple.com | |
| support.apple.com/en-us/120311 | [email protected] | support.apple.com | |
| support.apple.com/en-us/HT214061 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | Vendor Advisory |
| seclists.org/fulldisclosure/2024/Mar/23 | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | Mailing List |
| support.apple.com/en-us/HT214060 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | Vendor Advisory |
| support.apple.com/en-us/HT214059 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.