AI description
CVE-2024-23265 is a memory corruption vulnerability that was addressed by improving locking mechanisms. This vulnerability affects multiple Apple operating systems, including macOS Monterey, macOS Ventura, macOS Sonoma, visionOS, iOS, iPadOS, watchOS, and tvOS. Successful exploitation of this vulnerability could allow an application to cause unexpected system termination or enable the writing of arbitrary kernel memory. It was addressed by adding locking and guards, which prevents the return of a potentially poisoned or invalid pointer.
- Description
- A memory corruption vulnerability was addressed with improved locking. This issue is fixed in macOS Monterey 12.7.4, macOS Ventura 13.6.5, macOS Sonoma 14.4, visionOS 1.1, iOS 17.4 and iPadOS 17.4, watchOS 10.4, iOS 16.7.6 and iPadOS 16.7.6, tvOS 17.4. An app may be able to cause unexpected system termination or write kernel memory.
- Source
- product-security@apple.com
- NVD status
- Analyzed
- Products
- ipados, iphone_os, macos, tvos, visionos, watchos
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.
- Hype score
19
🚨New blog alert! Patch Diffing CVE-2024-23265: An iOS Kernel Memory Corruption Vulnerability https://t.co/uVMsogIozK by @s3rg0x Today we’re patch diffing CVE-2024-23265, a kernel-level memory corruption vulnerability in iOS. See how we used IPSW, Ghidra, and decompiled diffs
@8kSec
8 Oct 2025
9471 Impressions
40 Retweets
141 Likes
69 Bookmarks
0 Replies
1 Quote
🔴 #macOS Kernel Vulnerability: #CVE-2024-23265 (Critical) https://t.co/Uz096i6tIx
@dailycve
9 Dec 2024
14 Impressions
1 Retweet
3 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "9277B3E8-4519-4E07-A89A-A08C604AB78C",
"versionEndExcluding": "16.7.6"
},
{
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "7CB78D53-5EC0-45E5-871B-0C18F1E6D438",
"versionEndExcluding": "17.4",
"versionStartIncluding": "17.0"
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "2AF8B925-3DE5-4CC8-A4C3-95D8F107D607",
"versionEndExcluding": "16.7.6"
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "C2FE8515-300C-4B6F-92A0-7D1E6D93F907",
"versionEndExcluding": "17.4",
"versionStartIncluding": "17.0"
},
{
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "A61173BD-535F-46FC-B40F-DA78B168E420",
"versionEndExcluding": "12.7.4",
"versionStartIncluding": "12.0"
},
{
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "69C4F06A-061F-46B3-8BB7-5C9B47C00956",
"versionEndExcluding": "13.6.5",
"versionStartIncluding": "13.0"
},
{
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "73160D1F-755B-46D2-969F-DF8E43BB1099",
"versionEndExcluding": "14.4",
"versionStartIncluding": "14.0"
},
{
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "BB6BA6CB-001B-4440-A9AE-473F5722F8E0",
"versionEndExcluding": "17.4"
},
{
"criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "EB7F6CDA-FEC0-45D7-ACBE-8B5AD35F1AB5",
"versionEndExcluding": "1.1"
},
{
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "5547F484-4E4B-4961-BAF8-F891D50BB4B6",
"versionEndExcluding": "10.4"
}
],
"operator": "OR"
}
]
}
]