Vulnerability Description
A path handling issue was addressed with improved validation. This issue is fixed in macOS Monterey 12.7.4, macOS Sonoma 14.4, macOS Ventura 13.6.5. An app may be able to overwrite arbitrary files.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apple | Macos | >= 12.0, < 12.7.4 |
Related Weaknesses (CWE)
References
- https://support.apple.com/en-us/120884
- https://support.apple.com/en-us/120886
- https://support.apple.com/en-us/120895
- http://seclists.org/fulldisclosure/2024/Mar/21Mailing List
- http://seclists.org/fulldisclosure/2024/Mar/22Mailing List
- http://seclists.org/fulldisclosure/2024/Mar/23Mailing List
- https://support.apple.com/en-us/HT214083Vendor Advisory
- https://support.apple.com/en-us/HT214084Vendor Advisory
- https://support.apple.com/en-us/HT214085Vendor Advisory
- https://support.apple.com/kb/HT214083
- https://support.apple.com/kb/HT214084
- https://support.apple.com/kb/HT214085
FAQ
What is CVE-2024-23216?
CVE-2024-23216 is a vulnerability with a CVSS score of 7.1 (HIGH). A path handling issue was addressed with improved validation. This issue is fixed in macOS Monterey 12.7.4, macOS Sonoma 14.4, macOS Ventura 13.6.5. An app may be able to overwrite arbitrary files.
How severe is CVE-2024-23216?
CVE-2024-23216 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-23216?
Check the references section above for vendor advisories and patch information. Affected products include: Apple Macos.