CVE-2024-40833

A logic issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6, iOS 16.7.9 and iPadOS 16.7.9, macOS Monterey 12.7.6, macOS Ventura 13.6.8. A shortcut may be able to use sensitive data with certain actions without prompting the user.
References
Link Resource
http://seclists.org/fulldisclosure/2024/Jul/17 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2024/Jul/18 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2024/Jul/19 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2024/Jul/20 Mailing List Third Party Advisory
https://support.apple.com/en-us/HT214116 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT214118 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT214119 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT214120 Release Notes Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

History

23 Aug 2024, 14:50

Type Values Removed Values Added
First Time Apple ipados
Apple macos
Apple
Apple iphone Os
References () http://seclists.org/fulldisclosure/2024/Jul/17 - () http://seclists.org/fulldisclosure/2024/Jul/17 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2024/Jul/18 - () http://seclists.org/fulldisclosure/2024/Jul/18 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2024/Jul/19 - () http://seclists.org/fulldisclosure/2024/Jul/19 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2024/Jul/20 - () http://seclists.org/fulldisclosure/2024/Jul/20 - Mailing List, Third Party Advisory
References () https://support.apple.com/en-us/HT214116 - () https://support.apple.com/en-us/HT214116 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT214118 - () https://support.apple.com/en-us/HT214118 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT214119 - () https://support.apple.com/en-us/HT214119 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT214120 - () https://support.apple.com/en-us/HT214120 - Release Notes, Vendor Advisory
CPE cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

30 Jul 2024, 13:32

Type Values Removed Values Added
Summary
  • (es) Se solucionó un problema de lógica con controles mejorados. Este problema se solucionó en macOS Sonoma 14.6, iOS 16.7.9 y iPadOS 16.7.9, macOS Monterey 12.7.6, macOS Ventura 13.6.8. Un acceso directo puede utilizar datos confidenciales con determinadas acciones sin avisar al usuario.

30 Jul 2024, 02:15

Type Values Removed Values Added
References
  • () http://seclists.org/fulldisclosure/2024/Jul/18 -
  • () http://seclists.org/fulldisclosure/2024/Jul/19 -

30 Jul 2024, 01:15

Type Values Removed Values Added
References
  • () http://seclists.org/fulldisclosure/2024/Jul/17 -
  • () http://seclists.org/fulldisclosure/2024/Jul/20 -

29 Jul 2024, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-29 23:15

Updated : 2024-10-27 01:35


NVD link : CVE-2024-40833

Mitre link : CVE-2024-40833

CVE.ORG link : CVE-2024-40833


JSON object : View

Products Affected

apple

  • ipados
  • iphone_os
  • macos