CVE-2024-27823Race Condition in Apple IOS AND Ipados

CWE-362Race Condition11 documents4 sources
Severity
5.9MEDIUMNVD
EPSS
0.2%
top 59.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 29
Latest updateJul 30

Description

A race condition was addressed with improved locking. This issue is fixed in iOS 16.7.8 and iPadOS 16.7.8, iOS 17.5 and iPadOS 17.5, macOS Monterey 12.7.5, macOS Sonoma 14.5, macOS Ventura 13.6.7, tvOS 17.5, visionOS 1.3, watchOS 10.5. An attacker in a privileged network position may be able to spoof network packets.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 2.2 | Impact: 3.6

Affected Packages11 packages

CVEListV5apple/macos< 13.6.7+2
NVDapple/macos13.013.6.7+2
NVDapple/ipados17.017.5+1
CVEListV5apple/ios_and_ipados< 16.7.8+1
CVEListV5apple/tvos< 17.5

🔴Vulnerability Details

2
GHSA
GHSA-jqvf-c67w-p33m: A race condition was addressed with improved locking2024-07-30
CVEList
CVE-2024-27823: A race condition was addressed with improved locking2024-07-29

📋Vendor Advisories

8
Apple
CVE-2024-27823: visionOS 1.32024-07-29
Apple
CVE-2024-27823: iOS 17.5 and iPadOS 17.52024-05-13
Apple
CVE-2024-27823: iOS 16.7.8 and iPadOS 16.7.82024-05-13
Apple
CVE-2024-27823: macOS Ventura 13.6.72024-05-13
Apple
CVE-2024-27823: tvOS 17.52024-05-13
CVE-2024-27823 — Race Condition in Apple IOS AND Ipados | cvebase