cve/2024/CVE-2024-40815.md
2025-09-29 16:08:36 +00:00

25 lines
1.4 KiB
Markdown

### [CVE-2024-40815](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40815)
![](https://img.shields.io/static/v1?label=Product&message=iOS%20and%20iPadOS&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=macOS&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=tvOS&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=watchOS&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%2010.6%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%2013.6%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%2017.6%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=A%20malicious%20attacker%20with%20arbitrary%20read%20and%20write%20capability%20may%20be%20able%20to%20bypass%20Pointer%20Authentication&color=brighgreen)
### Description
A race condition was addressed with additional validation. This issue is fixed in macOS Ventura 13.6.8, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, macOS Sonoma 14.6. A malicious attacker with arbitrary read and write capability may be able to bypass Pointer Authentication.
### POC
#### Reference
- http://seclists.org/fulldisclosure/2024/Jul/16
- http://seclists.org/fulldisclosure/2024/Jul/18
- http://seclists.org/fulldisclosure/2024/Jul/19
#### Github
- https://github.com/w0wbox/CVE-2024-40815