{"api_version":"1","generated_at":"2026-04-22T20:52:40+00:00","cve":"CVE-2024-23216","urls":{"html":"https://cve.report/CVE-2024-23216","api":"https://cve.report/api/cve/CVE-2024-23216.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2024-23216","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2024-23216"},"summary":{"title":"CVE-2024-23216","description":"A path handling issue was addressed with improved validation. This issue is fixed in macOS Monterey 12.7.4, macOS Sonoma 14.4, macOS Ventura 13.6.5. An app may be able to overwrite arbitrary files.","state":"PUBLISHED","assigner":"apple","published_at":"2024-03-08 02:15:47","updated_at":"2026-04-02 19:16:58"},"problem_types":["CWE-22","An app may be able to overwrite arbitrary files","CWE-22 CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"],"metrics":[{"version":"3.1","source":"nvd@nist.gov","type":"Primary","score":"7.1","severity":"HIGH","vector":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H","baseScore":7.1,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"3.1","source":"ADP","type":"DECLARED","score":"6.7","severity":"MEDIUM","vector":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","data":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":6.7,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}},{"version":"3.1","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","score":"6.7","severity":"MEDIUM","vector":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":6.7,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}}],"references":[{"url":"https://support.apple.com/en-us/120895","name":"https://support.apple.com/en-us/120895","refsource":"product-security@apple.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://support.apple.com/kb/HT214085","name":"https://support.apple.com/kb/HT214085","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://support.apple.com/en-us/HT214085","name":"https://support.apple.com/en-us/HT214085","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://seclists.org/fulldisclosure/2024/Mar/21","name":"http://seclists.org/fulldisclosure/2024/Mar/21","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://support.apple.com/en-us/HT214084","name":"https://support.apple.com/en-us/HT214084","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://support.apple.com/kb/HT214083","name":"https://support.apple.com/kb/HT214083","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://support.apple.com/en-us/HT214083","name":"https://support.apple.com/en-us/HT214083","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://support.apple.com/en-us/120884","name":"https://support.apple.com/en-us/120884","refsource":"product-security@apple.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://seclists.org/fulldisclosure/2024/Mar/22","name":"http://seclists.org/fulldisclosure/2024/Mar/22","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://support.apple.com/en-us/120886","name":"https://support.apple.com/en-us/120886","refsource":"product-security@apple.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://seclists.org/fulldisclosure/2024/Mar/23","name":"http://seclists.org/fulldisclosure/2024/Mar/23","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://support.apple.com/kb/HT214084","name":"https://support.apple.com/kb/HT214084","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2024-23216","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-23216","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Apple","product":"macOS","version":"affected 12.7.4 custom","platforms":[]},{"source":"CNA","vendor":"Apple","product":"macOS","version":"affected 13.6.5 custom","platforms":[]},{"source":"CNA","vendor":"Apple","product":"macOS","version":"affected 14.4 custom","platforms":[]},{"source":"ADP","vendor":"apple","product":"macos","version":"affected 12.0 12.7 custom","platforms":[]},{"source":"ADP","vendor":"apple","product":"macos","version":"affected 13.0 13.6 custom","platforms":[]},{"source":"ADP","vendor":"apple","product":"macos","version":"affected 14.0 14.4 custom","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2024","cve_id":"23216","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"macos","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2024-23216","qid":"379476","title":"Apple macOS Ventura 13.6.5 Not Installed (HT214085)"},{"cve":"CVE-2024-23216","qid":"379477","title":"Apple macOS Monterey 12.7.4 Not Installed (HT214083)"},{"cve":"CVE-2024-23216","qid":"379478","title":"Apple macOS Sonoma 14.4 Not Installed (HT214084)"}]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2025-11-04T18:24:18.495Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"tags":["x_transferred"],"url":"https://support.apple.com/en-us/HT214083"},{"tags":["x_transferred"],"url":"https://support.apple.com/en-us/HT214085"},{"tags":["x_transferred"],"url":"https://support.apple.com/en-us/HT214084"},{"tags":["x_transferred"],"url":"http://seclists.org/fulldisclosure/2024/Mar/21"},{"tags":["x_transferred"],"url":"http://seclists.org/fulldisclosure/2024/Mar/22"},{"tags":["x_transferred"],"url":"http://seclists.org/fulldisclosure/2024/Mar/23"},{"url":"https://support.apple.com/kb/HT214085"},{"url":"https://support.apple.com/kb/HT214084"},{"url":"https://support.apple.com/kb/HT214083"}],"title":"CVE Program Container"},{"affected":[{"cpes":["cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","product":"macos","vendor":"apple","versions":[{"lessThan":"12.7","status":"affected","version":"12.0","versionType":"custom"},{"lessThan":"13.6","status":"affected","version":"13.0","versionType":"custom"},{"lessThan":"14.4","status":"affected","version":"14.0","versionType":"custom"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":6.7,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}},{"other":{"content":{"id":"CVE-2024-23216","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","timestamp":"2024-03-12T18:11:26.025017Z","version":"2.0.3"},"type":"ssvc"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-22","description":"CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2024-08-28T14:09:29.822Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"product":"macOS","vendor":"Apple","versions":[{"lessThan":"12.7.4","status":"affected","version":"0","versionType":"custom"},{"lessThan":"13.6.5","status":"affected","version":"0","versionType":"custom"},{"lessThan":"14.4","status":"affected","version":"0","versionType":"custom"}]}],"descriptions":[{"lang":"en","value":"A path handling issue was addressed with improved validation. This issue is fixed in macOS Monterey 12.7.4, macOS Sonoma 14.4, macOS Ventura 13.6.5. An app may be able to overwrite arbitrary files."}],"problemTypes":[{"descriptions":[{"description":"An app may be able to overwrite arbitrary files","lang":"en"}]}],"providerMetadata":{"dateUpdated":"2026-04-02T18:09:59.331Z","orgId":"286789f9-fbc2-4510-9f9a-43facdede74c","shortName":"apple"},"references":[{"url":"https://support.apple.com/en-us/120884"},{"url":"https://support.apple.com/en-us/120886"},{"url":"https://support.apple.com/en-us/120895"}]}},"cveMetadata":{"assignerOrgId":"286789f9-fbc2-4510-9f9a-43facdede74c","assignerShortName":"apple","cveId":"CVE-2024-23216","datePublished":"2024-03-08T01:35:25.068Z","dateReserved":"2024-01-12T22:22:21.477Z","dateUpdated":"2026-04-02T18:09:59.331Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2024-03-08 02:15:47","lastModifiedDate":"2026-04-02 19:16:58","problem_types":["CWE-22","An app may be able to overwrite arbitrary files","CWE-22 CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H","baseScore":7.1,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.2},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":6.7,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.8,"impactScore":5.9}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionStartIncluding":"12.0","versionEndExcluding":"12.7.4","matchCriteriaId":"A61173BD-535F-46FC-B40F-DA78B168E420"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionStartIncluding":"13.0","versionEndExcluding":"13.6.5","matchCriteriaId":"69C4F06A-061F-46B3-8BB7-5C9B47C00956"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionStartIncluding":"14.0","versionEndExcluding":"14.4","matchCriteriaId":"73160D1F-755B-46D2-969F-DF8E43BB1099"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2024","CveId":"23216","Ordinal":"1","Title":"CVE-2024-23216","CVE":"CVE-2024-23216","Year":"2024"},"notes":[{"CveYear":"2024","CveId":"23216","Ordinal":"1","NoteData":"A path handling issue was addressed with improved validation. This issue is fixed in macOS Monterey 12.7.4, macOS Sonoma 14.4, macOS Ventura 13.6.5. An app may be able to overwrite arbitrary files.","Type":"Description","Title":"CVE-2024-23216"}]}}}