CVE-2024-27834
Summary
| CVE | CVE-2024-27834 |
|---|---|
| State | PUBLISHED |
| Assigner | apple |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2024-05-14 15:13:06 UTC |
| Updated | 2026-04-02 19:17:27 UTC |
| Description | The issue was addressed with improved checks. This issue is fixed in Safari 17.5, iOS 16.7.8 and iPadOS 16.7.8, iOS 17.5 and iPadOS 17.5, macOS Sonoma 14.5, tvOS 17.5, watchOS 10.5. An attacker with arbitrary read and write capability may be able to bypass Pointer Authentication. |
Risk And Classification
Primary CVSS: v3.1 5.5 MEDIUM from [email protected]
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
EPSS: 0.000080000 probability, percentile 0.007020000 (date 2026-04-02)
Problem Types: NVD-CWE-noinfo | CWE-277 | An attacker with arbitrary read and write capability may be able to bypass Pointer Authentication | CWE-277 CWE-277 Insecure Inherited Permissions
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Primary | 5.5 | MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
| 3.1 | ADP | DECLARED | 8.1 | HIGH | CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
| 3.1 | 134c704f-9b21-4f2e-91b3-4a467353bcc0 | Secondary | 8.1 | HIGH | CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
CVSS v3.1 Breakdown
Attack Vector
LocalAttack Complexity
LowPrivileges Required
LowUser Interaction
NoneScope
UnchangedConfidentiality
NoneIntegrity
HighAvailability
NoneCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Apple | Ipados | All | All | All | All |
| Operating System | Apple | Iphone Os | All | All | All | All |
| Operating System | Apple | Macos | All | All | All | All |
| Application | Apple | Safari | All | All | All | All |
| Operating System | Apple | Tvos | All | All | All | All |
| Operating System | Apple | Watchos | All | All | All | All |
| Operating System | Fedoraproject | Fedora | 39 | All | All | All |
| Operating System | Fedoraproject | Fedora | 40 | All | All | All |
| Application | Webkitgtk | Webkitgtk | All | All | All | All |
| Application | Wpewebkit | Wpe Webkit | All | All | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Apple | Safari | affected 17.5 custom | Not specified |
| CNA | Apple | IOS And IPadOS | affected 16.7.8 custom | Not specified |
| CNA | Apple | IOS And IPadOS | affected 17.5 custom | Not specified |
| CNA | Apple | MacOS | affected 14.5 custom | Not specified |
| CNA | Apple | TvOS | affected 17.5 custom | Not specified |
| CNA | Apple | WatchOS | affected 10.5 custom | Not specified |
| ADP | Apple | Ipad Os | affected 17.5 custom | Not specified |
| ADP | Apple | Macos | affected 14.5 custom | Not specified |
| ADP | Apple | Tvos | affected 17.5 custom | Not specified |
| ADP | Apple | Watchos | affected 10.5 custom | Not specified |
| ADP | Apple | Iphone Os | affected 17.5 custom | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| support.apple.com/kb/HT214102 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | |
| support.apple.com/en-us/HT214106 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | Vendor Advisory |
| seclists.org/fulldisclosure/2024/May/16 | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | Mailing List |
| support.apple.com/en-us/120898 | [email protected] | support.apple.com | |
| seclists.org/fulldisclosure/2024/May/9 | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | Mailing List |
| support.apple.com/kb/HT214100 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | |
| lists.fedoraproject.org/archives/list/[email protected]/messag... | af854a3a-2127-422b-91ae-364da2661108 | lists.fedoraproject.org | Mailing List |
| seclists.org/fulldisclosure/2024/May/12 | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | Mailing List |
| support.apple.com/kb/HT214106 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | |
| www.openwall.com/lists/oss-security/2024/05/21/1 | af854a3a-2127-422b-91ae-364da2661108 | www.openwall.com | Mailing List |
| seclists.org/fulldisclosure/2024/May/17 | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | Mailing List |
| support.apple.com/en-us/HT214104 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | Vendor Advisory |
| support.apple.com/en-us/120902 | [email protected] | support.apple.com | |
| support.apple.com/kb/HT214104 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | |
| support.apple.com/en-us/120903 | [email protected] | support.apple.com | |
| lists.fedoraproject.org/archives/list/[email protected]/messag... | af854a3a-2127-422b-91ae-364da2661108 | lists.fedoraproject.org | Mailing List |
| support.apple.com/en-us/120901 | [email protected] | support.apple.com | |
| support.apple.com/en-us/HT214101 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | Vendor Advisory |
| support.apple.com/en-us/HT214103 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | Vendor Advisory |
| seclists.org/fulldisclosure/2024/May/10 | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | Mailing List |
| support.apple.com/en-us/120896 | [email protected] | support.apple.com | |
| support.apple.com/en-us/120905 | [email protected] | support.apple.com | |
| support.apple.com/en-us/HT214102 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.