{"api_version":"1","generated_at":"2026-04-22T21:03:54+00:00","cve":"CVE-2024-23296","urls":{"html":"https://cve.report/CVE-2024-23296","api":"https://cve.report/api/cve/CVE-2024-23296.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2024-23296","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2024-23296"},"summary":{"title":"CVE-2024-23296","description":"A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 16.7.8 and iPadOS 16.7.8, iOS 17.4 and iPadOS 17.4, macOS Monterey 12.7.6, macOS Sonoma 14.4, macOS Ventura 13.6.7, tvOS 17.4, visionOS 1.1, watchOS 10.4. An attacker with arbitrary kernel read and write capability may be able to bypass kernel memory protections. Apple is aware of a report that this issue may have been exploited.","state":"PUBLISHED","assigner":"apple","published_at":"2024-03-05 20:16:01","updated_at":"2026-04-03 11:43:21"},"problem_types":["CWE-787","An attacker with arbitrary kernel read and write capability may be able to bypass kernel memory protections. Apple is aware of a report that this issue may have been exploited.","CWE-787 CWE-787 Out-of-bounds Write"],"metrics":[{"version":"3.1","source":"nvd@nist.gov","type":"Primary","score":"7.8","severity":"HIGH","vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"3.1","source":"ADP","type":"DECLARED","score":"7.8","severity":"HIGH","vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","data":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}},{"version":"3.1","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","score":"7.8","severity":"HIGH","vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}}],"references":[{"url":"https://support.apple.com/en-us/120883","name":"https://support.apple.com/en-us/120883","refsource":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://support.apple.com/kb/HT214088","name":"https://support.apple.com/kb/HT214088","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://support.apple.com/en-us/120895","name":"https://support.apple.com/en-us/120895","refsource":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://support.apple.com/en-us/120898","name":"https://support.apple.com/en-us/120898","refsource":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://seclists.org/fulldisclosure/2024/Mar/21","name":"http://seclists.org/fulldisclosure/2024/Mar/21","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://support.apple.com/kb/HT214087","name":"https://support.apple.com/kb/HT214087","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://support.apple.com/kb/HT214100","name":"https://support.apple.com/kb/HT214100","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://support.apple.com/en-us/120910","name":"https://support.apple.com/en-us/120910","refsource":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://support.apple.com/en-us/120881","name":"https://support.apple.com/en-us/120881","refsource":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://seclists.org/fulldisclosure/2024/Mar/25","name":"http://seclists.org/fulldisclosure/2024/Mar/25","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://seclists.org/fulldisclosure/2024/May/13","name":"http://seclists.org/fulldisclosure/2024/May/13","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://seclists.org/fulldisclosure/2024/Mar/24","name":"http://seclists.org/fulldisclosure/2024/Mar/24","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://support.apple.com/en-us/120900","name":"https://support.apple.com/en-us/120900","refsource":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://support.apple.com/kb/HT214118","name":"https://support.apple.com/kb/HT214118","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://support.apple.com/kb/HT214081","name":"https://support.apple.com/kb/HT214081","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://seclists.org/fulldisclosure/2024/Mar/18","name":"http://seclists.org/fulldisclosure/2024/Mar/18","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://support.apple.com/en-us/120893","name":"https://support.apple.com/en-us/120893","refsource":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://seclists.org/fulldisclosure/2024/Jul/20","name":"http://seclists.org/fulldisclosure/2024/Jul/20","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://support.apple.com/kb/HT214107","name":"https://support.apple.com/kb/HT214107","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://seclists.org/fulldisclosure/2024/Mar/26","name":"http://seclists.org/fulldisclosure/2024/Mar/26","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://seclists.org/fulldisclosure/2024/May/11","name":"http://seclists.org/fulldisclosure/2024/May/11","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-23296","name":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-23296","refsource":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://support.apple.com/kb/HT214086","name":"https://support.apple.com/kb/HT214086","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://support.apple.com/kb/HT214084","name":"https://support.apple.com/kb/HT214084","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://support.apple.com/en-us/120882","name":"https://support.apple.com/en-us/120882","refsource":"product-security@apple.com","tags":["Release Notes","Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://support.apple.com/en-us/HT214081","name":"https://support.apple.com/en-us/HT214081","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2024-23296","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-23296","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Apple","product":"iOS and iPadOS","version":"affected 16.7.8 custom","platforms":[]},{"source":"CNA","vendor":"Apple","product":"iOS and iPadOS","version":"affected 17.4 custom","platforms":[]},{"source":"CNA","vendor":"Apple","product":"macOS","version":"affected 12.7.6 custom","platforms":[]},{"source":"CNA","vendor":"Apple","product":"macOS","version":"affected 13.6.7 custom","platforms":[]},{"source":"CNA","vendor":"Apple","product":"macOS","version":"affected 14.4 custom","platforms":[]},{"source":"CNA","vendor":"Apple","product":"tvOS","version":"affected 17.4 custom","platforms":[]},{"source":"CNA","vendor":"Apple","product":"visionOS","version":"affected 1.1 custom","platforms":[]},{"source":"CNA","vendor":"Apple","product":"watchOS","version":"affected 10.4 custom","platforms":[]},{"source":"ADP","vendor":"apple","product":"ipad_os","version":"affected 17.4 custom","platforms":[]},{"source":"ADP","vendor":"apple","product":"iphone_os","version":"affected 17.4 custom","platforms":[]},{"source":"ADP","vendor":"apple","product":"macos","version":"affected 14.0 14.4 custom","platforms":[]},{"source":"ADP","vendor":"apple","product":"tvos","version":"affected 17.4 custom","platforms":[]},{"source":"ADP","vendor":"apple","product":"visionos","version":"affected 1.1 custom","platforms":[]},{"source":"ADP","vendor":"apple","product":"watchos","version":"affected 10.4 custom","platforms":[]}],"timeline":[{"source":"ADP","time":"2024-03-06T00:00:00.000Z","lang":"en","value":"CVE-2024-23296 added to CISA KEV"}],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2024","cve_id":"23296","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"ipados","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":{"cve_year":"2024","cve_id":"23296","cve":"CVE-2024-23296","vendorProject":"Apple","product":"Multiple Products","vulnerabilityName":"Apple Multiple Products Memory Corruption Vulnerability","dateAdded":"2024-03-06","shortDescription":"Apple iOS, iPadOS, macOS, tvOS, and watchOS RTKit contain a memory corruption vulnerability that allows an attacker with arbitrary kernel read and write capability to bypass kernel memory protections.","requiredAction":"Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.","dueDate":"2024-03-27","knownRansomwareCampaignUse":"Unknown","notes":"https://support.apple.com/en-us/HT214081, https://support.apple.com/en-us/HT214082, https://support.apple.com/en-us/HT214084, https://support.apple.com/en-us/HT214086, https://support.apple.com/en-us/HT214088  ;  https://nvd.nist.gov/vuln/detail/CVE-2024-23296","cwes":"CWE-787","catalogVersion":"2026.04.22","updated_at":"2026-04-22 20:03:10"},"epss":{"cve_year":"2024","cve_id":"23296","cve":"CVE-2024-23296","epss":"0.002580000","percentile":"0.492130000","score_date":"2026-04-21","updated_at":"2026-04-22 00:07:42"},"legacy_qids":[{"cve":"CVE-2024-23296","qid":"379478","title":"Apple macOS Sonoma 14.4 Not Installed (HT214084)"},{"cve":"CVE-2024-23296","qid":"610549","title":"Apple iOS 17.4 and iPadOS 17.4 Security Update Missing"}]},"source_records":{"cve_program":{"containers":{"adp":[{"affected":[{"cpes":["cpe:2.3:o:apple:ipad_os:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","product":"ipad_os","vendor":"apple","versions":[{"lessThan":"17.4","status":"affected","version":"0","versionType":"custom"}]},{"cpes":["cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","product":"iphone_os","vendor":"apple","versions":[{"lessThan":"17.4","status":"affected","version":"0","versionType":"custom"}]},{"cpes":["cpe:2.3:o:apple:macos:14.0:*:*:*:*:*:*:*"],"defaultStatus":"unknown","product":"macos","vendor":"apple","versions":[{"lessThan":"14.4","status":"affected","version":"14.0","versionType":"custom"}]},{"cpes":["cpe:2.3:o:apple:tvos:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","product":"tvos","vendor":"apple","versions":[{"lessThan":"17.4","status":"affected","version":"0","versionType":"custom"}]},{"cpes":["cpe:2.3:o:apple:visionos:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","product":"visionos","vendor":"apple","versions":[{"lessThan":"1.1","status":"affected","version":"0","versionType":"custom"}]},{"cpes":["cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","product":"watchos","vendor":"apple","versions":[{"lessThan":"10.4","status":"affected","version":"0","versionType":"custom"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}},{"other":{"content":{"id":"CVE-2024-23296","options":[{"Exploitation":"active"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","timestamp":"2024-03-09T05:00:52.848270Z","version":"2.0.3"},"type":"ssvc"}},{"other":{"content":{"dateAdded":"2024-03-06","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-23296"},"type":"kev"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-787","description":"CWE-787 Out-of-bounds Write","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2025-10-21T23:05:23.256Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"references":[{"tags":["government-resource"],"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-23296"}],"timeline":[{"lang":"en","time":"2024-03-06T00:00:00.000Z","value":"CVE-2024-23296 added to CISA KEV"}],"title":"CISA ADP Vulnrichment"},{"providerMetadata":{"dateUpdated":"2025-11-04T18:28:31.800Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"tags":["x_transferred"],"url":"https://support.apple.com/en-us/HT214081"},{"tags":["x_transferred"],"url":"https://support.apple.com/kb/HT214088"},{"tags":["x_transferred"],"url":"https://support.apple.com/kb/HT214084"},{"tags":["x_transferred"],"url":"https://support.apple.com/kb/HT214086"},{"tags":["x_transferred"],"url":"https://support.apple.com/kb/HT214087"},{"tags":["x_transferred"],"url":"http://seclists.org/fulldisclosure/2024/Mar/18"},{"tags":["x_transferred"],"url":"http://seclists.org/fulldisclosure/2024/Mar/21"},{"tags":["x_transferred"],"url":"http://seclists.org/fulldisclosure/2024/Mar/25"},{"tags":["x_transferred"],"url":"http://seclists.org/fulldisclosure/2024/Mar/24"},{"tags":["x_transferred"],"url":"http://seclists.org/fulldisclosure/2024/Mar/26"},{"tags":["x_transferred"],"url":"https://support.apple.com/kb/HT214107"},{"tags":["x_transferred"],"url":"http://seclists.org/fulldisclosure/2024/May/11"},{"tags":["x_transferred"],"url":"http://seclists.org/fulldisclosure/2024/May/13"},{"tags":["x_transferred"],"url":"https://support.apple.com/kb/HT214100"},{"tags":["x_transferred"],"url":"https://support.apple.com/kb/HT214118"},{"tags":["x_transferred"],"url":"http://seclists.org/fulldisclosure/2024/Jul/20"},{"url":"https://support.apple.com/kb/HT214081"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"iOS and iPadOS","vendor":"Apple","versions":[{"lessThan":"16.7.8","status":"affected","version":"0","versionType":"custom"},{"lessThan":"17.4","status":"affected","version":"0","versionType":"custom"}]},{"product":"macOS","vendor":"Apple","versions":[{"lessThan":"12.7.6","status":"affected","version":"0","versionType":"custom"},{"lessThan":"13.6.7","status":"affected","version":"0","versionType":"custom"},{"lessThan":"14.4","status":"affected","version":"0","versionType":"custom"}]},{"product":"tvOS","vendor":"Apple","versions":[{"lessThan":"17.4","status":"affected","version":"0","versionType":"custom"}]},{"product":"visionOS","vendor":"Apple","versions":[{"lessThan":"1.1","status":"affected","version":"0","versionType":"custom"}]},{"product":"watchOS","vendor":"Apple","versions":[{"lessThan":"10.4","status":"affected","version":"0","versionType":"custom"}]}],"descriptions":[{"lang":"en","value":"A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 16.7.8 and iPadOS 16.7.8, iOS 17.4 and iPadOS 17.4, macOS Monterey 12.7.6, macOS Sonoma 14.4, macOS Ventura 13.6.7, tvOS 17.4, visionOS 1.1, watchOS 10.4. An attacker with arbitrary kernel read and write capability may be able to bypass kernel memory protections. Apple is aware of a report that this issue may have been exploited."}],"problemTypes":[{"descriptions":[{"description":"An attacker with arbitrary kernel read and write capability may be able to bypass kernel memory protections. Apple is aware of a report that this issue may have been exploited.","lang":"en"}]}],"providerMetadata":{"dateUpdated":"2026-04-02T18:25:23.413Z","orgId":"286789f9-fbc2-4510-9f9a-43facdede74c","shortName":"apple"},"references":[{"url":"https://support.apple.com/en-us/120881"},{"url":"https://support.apple.com/en-us/120882"},{"url":"https://support.apple.com/en-us/120883"},{"url":"https://support.apple.com/en-us/120893"},{"url":"https://support.apple.com/en-us/120895"},{"url":"https://support.apple.com/en-us/120898"},{"url":"https://support.apple.com/en-us/120900"},{"url":"https://support.apple.com/en-us/120910"}]}},"cveMetadata":{"assignerOrgId":"286789f9-fbc2-4510-9f9a-43facdede74c","assignerShortName":"apple","cveId":"CVE-2024-23296","datePublished":"2024-03-05T19:24:13.999Z","dateReserved":"2024-01-12T22:22:21.502Z","dateUpdated":"2026-04-02T18:25:23.413Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2024-03-05 20:16:01","lastModifiedDate":"2026-04-03 11:43:21","problem_types":["CWE-787","An attacker with arbitrary kernel read and write capability may be able to bypass kernel memory protections. Apple is aware of a report that this issue may have been exploited.","CWE-787 CWE-787 Out-of-bounds Write"],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*","versionEndExcluding":"16.7.8","matchCriteriaId":"732206AE-D798-41FB-8D91-F796820F912D"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*","versionStartIncluding":"17.0","versionEndExcluding":"17.4","matchCriteriaId":"7CB78D53-5EC0-45E5-871B-0C18F1E6D438"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","versionEndExcluding":"16.7.8","matchCriteriaId":"0EDF6AF0-A238-47E5-9A9D-F6FDB832DD8C"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","versionStartIncluding":"17.0","versionEndExcluding":"17.4","matchCriteriaId":"C2FE8515-300C-4B6F-92A0-7D1E6D93F907"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionStartIncluding":"12.0","versionEndExcluding":"12.7.6","matchCriteriaId":"EA924D87-8FAE-4E34-83F7-A5E25C7450E5"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionStartIncluding":"13.0","versionEndExcluding":"13.6.7","matchCriteriaId":"2D797210-B0F0-44AE-9028-47C18C22AFA5"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionStartIncluding":"14.0","versionEndExcluding":"14.4","matchCriteriaId":"73160D1F-755B-46D2-969F-DF8E43BB1099"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*","versionEndExcluding":"17.4","matchCriteriaId":"BB6BA6CB-001B-4440-A9AE-473F5722F8E0"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*","versionEndExcluding":"1.1","matchCriteriaId":"EB7F6CDA-FEC0-45D7-ACBE-8B5AD35F1AB5"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*","versionEndExcluding":"10.4","matchCriteriaId":"5547F484-4E4B-4961-BAF8-F891D50BB4B6"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2024","CveId":"23296","Ordinal":"1","Title":"CVE-2024-23296","CVE":"CVE-2024-23296","Year":"2024"},"notes":[{"CveYear":"2024","CveId":"23296","Ordinal":"1","NoteData":"A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 16.7.8 and iPadOS 16.7.8, iOS 17.4 and iPadOS 17.4, macOS Monterey 12.7.6, macOS Sonoma 14.4, macOS Ventura 13.6.7, tvOS 17.4, visionOS 1.1, watchOS 10.4. An attacker with arbitrary kernel read and write capability may be able to bypass kernel memory protections. Apple is aware of a report that this issue may have been exploited.","Type":"Description","Title":"CVE-2024-23296"}]}}}