CVE-2024-23296
Summary
| CVE | CVE-2024-23296 |
|---|---|
| State | PUBLISHED |
| Assigner | apple |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2024-03-05 20:16:01 UTC |
| Updated | 2026-04-03 11:43:21 UTC |
| Description | A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 16.7.8 and iPadOS 16.7.8, iOS 17.4 and iPadOS 17.4, macOS Monterey 12.7.6, macOS Sonoma 14.4, macOS Ventura 13.6.7, tvOS 17.4, visionOS 1.1, watchOS 10.4. An attacker with arbitrary kernel read and write capability may be able to bypass kernel memory protections. Apple is aware of a report that this issue may have been exploited. |
Risk And Classification
Primary CVSS: v3.1 7.8 HIGH from [email protected]
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS: 0.002580000 probability, percentile 0.492130000 (date 2026-04-21)
CISA KEV: Listed on 2024-03-06; due 2024-03-27; ransomware use Unknown
Problem Types: CWE-787 | An attacker with arbitrary kernel read and write capability may be able to bypass kernel memory protections. Apple is aware of a report that this issue may have been exploited. | CWE-787 CWE-787 Out-of-bounds Write
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Primary | 7.8 | HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
| 3.1 | ADP | DECLARED | 7.8 | HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
| 3.1 | 134c704f-9b21-4f2e-91b3-4a467353bcc0 | Secondary | 7.8 | HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVSS v3.1 Breakdown
Attack Vector
LocalAttack Complexity
LowPrivileges Required
LowUser Interaction
NoneScope
UnchangedConfidentiality
HighIntegrity
HighAvailability
HighCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA Known Exploited Vulnerability
| Vendor | Apple |
|---|---|
| Product | Multiple Products |
| Name | Apple Multiple Products Memory Corruption Vulnerability |
| Required Action | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. |
| Notes | https://support.apple.com/en-us/HT214081, https://support.apple.com/en-us/HT214082, https://support.apple.com/en-us/HT214084, https://support.apple.com/en-us/HT214086, https://support.apple.com/en-us/HT214088 ; https://nvd.nist.gov/vuln/detail/CVE-2024-23296 |
NVD Known Affected Configurations (CPE 2.3)
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Apple | IOS And IPadOS | affected 16.7.8 custom | Not specified |
| CNA | Apple | IOS And IPadOS | affected 17.4 custom | Not specified |
| CNA | Apple | MacOS | affected 12.7.6 custom | Not specified |
| CNA | Apple | MacOS | affected 13.6.7 custom | Not specified |
| CNA | Apple | MacOS | affected 14.4 custom | Not specified |
| CNA | Apple | TvOS | affected 17.4 custom | Not specified |
| CNA | Apple | VisionOS | affected 1.1 custom | Not specified |
| CNA | Apple | WatchOS | affected 10.4 custom | Not specified |
| ADP | Apple | Ipad Os | affected 17.4 custom | Not specified |
| ADP | Apple | Iphone Os | affected 17.4 custom | Not specified |
| ADP | Apple | Macos | affected 14.0 14.4 custom | Not specified |
| ADP | Apple | Tvos | affected 17.4 custom | Not specified |
| ADP | Apple | Visionos | affected 1.1 custom | Not specified |
| ADP | Apple | Watchos | affected 10.4 custom | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| support.apple.com/en-us/120883 | [email protected] | support.apple.com | Release Notes, Vendor Advisory |
| support.apple.com/kb/HT214088 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | Vendor Advisory |
| support.apple.com/en-us/120895 | [email protected] | support.apple.com | Release Notes, Vendor Advisory |
| support.apple.com/en-us/120898 | [email protected] | support.apple.com | Release Notes, Vendor Advisory |
| seclists.org/fulldisclosure/2024/Mar/21 | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | Mailing List, Third Party Advisory |
| support.apple.com/kb/HT214087 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | Vendor Advisory |
| support.apple.com/kb/HT214100 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | Vendor Advisory |
| support.apple.com/en-us/120910 | [email protected] | support.apple.com | Release Notes, Vendor Advisory |
| support.apple.com/en-us/120881 | [email protected] | support.apple.com | Release Notes, Vendor Advisory |
| seclists.org/fulldisclosure/2024/Mar/25 | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | Mailing List, Third Party Advisory |
| seclists.org/fulldisclosure/2024/May/13 | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | Mailing List, Third Party Advisory |
| seclists.org/fulldisclosure/2024/Mar/24 | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | Mailing List, Third Party Advisory |
| support.apple.com/en-us/120900 | [email protected] | support.apple.com | Release Notes, Vendor Advisory |
| support.apple.com/kb/HT214118 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | Vendor Advisory |
| support.apple.com/kb/HT214081 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | Vendor Advisory |
| seclists.org/fulldisclosure/2024/Mar/18 | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | Mailing List, Third Party Advisory |
| support.apple.com/en-us/120893 | [email protected] | support.apple.com | Release Notes, Vendor Advisory |
| seclists.org/fulldisclosure/2024/Jul/20 | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | Mailing List, Third Party Advisory |
| support.apple.com/kb/HT214107 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | Vendor Advisory |
| seclists.org/fulldisclosure/2024/Mar/26 | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | Mailing List, Third Party Advisory |
| seclists.org/fulldisclosure/2024/May/11 | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | Mailing List, Third Party Advisory |
| www.cisa.gov/known-exploited-vulnerabilities-catalog | 134c704f-9b21-4f2e-91b3-4a467353bcc0 | www.cisa.gov | US Government Resource |
| support.apple.com/kb/HT214086 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | Vendor Advisory |
| support.apple.com/kb/HT214084 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | Vendor Advisory |
| support.apple.com/en-us/120882 | [email protected] | support.apple.com | Release Notes, Vendor Advisory |
| support.apple.com/en-us/HT214081 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
| CISA Known Exploited Vulnerabilities catalog | CISA | www.cisa.gov | kev |
No vendor comments have been submitted for this CVE.
Additional Advisory Data
| Source | Time | Event |
|---|---|---|
| ADP | 2024-03-06T00:00:00.000Z | CVE-2024-23296 added to CISA KEV |