2024-10-29 08:00:49 +00:00
{
"id" : "CVE-2024-44229" ,
"sourceIdentifier" : "product-security@apple.com" ,
"published" : "2024-10-28T21:15:06.417" ,
2024-10-30 00:58:37 +00:00
"lastModified" : "2024-10-29T23:15:03.437" ,
"vulnStatus" : "Modified" ,
2024-10-29 08:00:49 +00:00
"cveTags" : [ ] ,
"descriptions" : [
{
"lang" : "en" ,
2024-10-30 00:58:37 +00:00
"value" : "An information leakage was addressed with additional validation. This issue is fixed in visionOS 2.1, iOS 18.1 and iPadOS 18.1, macOS Sequoia 15.1, Safari 18.1. Private browsing may leak some browsing history."
2024-10-29 15:03:51 +00:00
} ,
{
"lang" : "es" ,
"value" : "Se solucion\u00f3 una fuga de informaci\u00f3n con una validaci\u00f3n adicional. Este problema se solucion\u00f3 en visionOS 2.1, iOS 18.1 y iPadOS 18.1. La navegaci\u00f3n privada puede filtrar parte del historial de navegaci\u00f3n."
2024-10-29 08:00:49 +00:00
}
] ,
2024-10-29 21:03:20 +00:00
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 5.3 ,
"baseSeverity" : "MEDIUM" ,
2024-10-29 21:03:20 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "NONE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "NONE"
2024-10-29 21:03:20 +00:00
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 1.4
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-noinfo"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "18.1" ,
"matchCriteriaId" : "1F64554D-9F90-4871-9A0B-FB28BD52F4B3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "18.1" ,
"matchCriteriaId" : "B9A26654-0DDB-4D4D-BB1E-C65C3339148E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "2.1" ,
"matchCriteriaId" : "15E4723D-CD2B-4486-A69C-27F843844A80"
}
]
}
]
}
] ,
2024-10-29 08:00:49 +00:00
"references" : [
{
"url" : "https://support.apple.com/en-us/121563" ,
2024-10-29 21:03:20 +00:00
"source" : "product-security@apple.com" ,
"tags" : [
"Release Notes" ,
"Vendor Advisory"
]
2024-10-29 08:00:49 +00:00
} ,
2024-10-30 00:58:37 +00:00
{
"url" : "https://support.apple.com/en-us/121564" ,
"source" : "product-security@apple.com"
} ,
2024-10-29 08:00:49 +00:00
{
"url" : "https://support.apple.com/en-us/121566" ,
2024-10-29 21:03:20 +00:00
"source" : "product-security@apple.com" ,
"tags" : [
"Release Notes" ,
"Vendor Advisory"
]
2024-10-30 00:58:37 +00:00
} ,
{
"url" : "https://support.apple.com/en-us/121571" ,
"source" : "product-security@apple.com"
2024-10-29 08:00:49 +00:00
}
]
}