Vulnerability Description
An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Monterey 12.7.6, macOS Sonoma 14.6, macOS Ventura 13.6.8. Third party app extensions may not receive the correct sandbox restrictions.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apple | Macos | >= 12.0, < 12.7.6 |
Related Weaknesses (CWE)
References
- https://support.apple.com/en-us/120910
- https://support.apple.com/en-us/120911
- https://support.apple.com/en-us/120912
- http://seclists.org/fulldisclosure/2024/Jul/18Mailing List
- http://seclists.org/fulldisclosure/2024/Jul/19Mailing List
- http://seclists.org/fulldisclosure/2024/Jul/20Mailing List
- https://support.apple.com/en-us/HT214118Vendor Advisory
- https://support.apple.com/en-us/HT214119Vendor Advisory
- https://support.apple.com/en-us/HT214120Vendor Advisory
- https://support.apple.com/kb/HT214118
- https://support.apple.com/kb/HT214119
- https://support.apple.com/kb/HT214120
FAQ
What is CVE-2024-40821?
CVE-2024-40821 is a vulnerability with a CVSS score of 7.1 (HIGH). An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Monterey 12.7.6, macOS Sonoma 14.6, macOS Ventura 13.6.8. Third party app extensions may not receive th...
How severe is CVE-2024-40821?
CVE-2024-40821 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-40821?
Check the references section above for vendor advisories and patch information. Affected products include: Apple Macos.