Risk | Low |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2024-44207 CVE-2024-44204 |
CWE-ID | CWE-362 CWE-264 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software Subscribe |
Apple iOS Operating systems & Components / Operating system iPadOS Operating systems & Components / Operating system |
Vendor | Apple Inc. |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU98045
Risk: Low
CVSSv3.1: 2.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-44207
Exploit availability: No
DescriptionThe vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to a race condition. Audio messages in Messages may be able to capture a few seconds of audio before the microphone indicator is activated.
MitigationInstall updates from vendor's website.
Vulnerable software versionsApple iOS: 18.0 22A3354
iPadOS: 18.0 22A3354
CPE2.3 External linkshttp://support.apple.com/en-us/121373
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98046
Risk: Low
CVSSv3.1: 2.1 [CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-44204
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a attacker to gain access to sensitive information.
The vulnerability exists due to a logic issue in passwords handling. A user's saved passwords may be read aloud by VoiceOver.
MitigationInstall updates from vendor's website.
Vulnerable software versionsApple iOS: 18.0 22A3354
iPadOS: 18.0 22A3354
CPE2.3 External linkshttp://support.apple.com/en-us/121373
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.