CVE-2024-44131Link Following in Apple IOS AND Ipados

CWE-59Link Following5 documents4 sources
Severity
5.5MEDIUMNVD
EPSS
0.2%
top 55.21%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 17
Latest updateAug 28

Description

This issue was addressed with improved validation of symlinks. This issue is fixed in iOS 18 and iPadOS 18, macOS Sequoia 15. An app may be able to access sensitive user data.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6

Affected Packages7 packages

CVEListV5apple/macos< 15
NVDapple/macos< 15.0
NVDapple/ipados< 18.0
CVEListV5apple/ios_and_ipados< 18

🔴Vulnerability Details

1
GHSA
GHSA-cmvv-gwr2-36xm: This issue was addressed with improved validation of symlinks2024-09-17

📋Vendor Advisories

2
Apple
CVE-2024-44131: macOS Sequoia 152024-09-16
Apple
CVE-2024-44131: iOS 18 and iPadOS 182024-09-16

📄Research Papers

1
arXiv
Improving Google A2A Protocol: Protecting Sensitive Data and Mitigating Unintended Harms in Multi-Agent Systems2025-08-28
CVE-2024-44131 — Link Following in Apple IOS AND Ipados | cvebase