#VU105911 Protection mechanism failure in macOS - CVE-2024-54564


Vulnerability identifier: #VU105911

Vulnerability risk: Medium

CVSSv4.0: 1.8 [CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2024-54564

CWE-ID: CWE-693

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
macOS
Operating systems & Components / Operating system

Vendor: Apple Inc.

Description

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to insufficient implementation of security measures. A file received from AirDrop may not have the quarantine flag applied. This can help an attacker into tricking the victim to execute the file, as it will appear as safe for execution.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

macOS: 14.0 23A344 - 14.5 23F79


External links
https://support.apple.com/en-us/120911


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability