SB2024091710 - Multiple vulnerabilities in Apple watchOS



SB2024091710 - Multiple vulnerabilities in Apple watchOS

Published: September 17, 2024 Updated: March 6, 2025

Security Bulletin ID SB2024091710
Severity
High
Patch available
YES
Number of vulnerabilities 16
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 6% Medium 19% Low 75%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 16 secuirty vulnerabilities.


1) Security features bypass (CVE-ID: CVE-2024-44171)

The vulnerability allows an attacker to bypass implemented security restrictions.

The vulnerability exists due to a state management error in the accessibility feature. An attacker with physical access to device can control nearby devices.


2) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2024-40850)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists in Game Center due to improperly imposed security restrictions. A local application can gain unauthorized access to certain files on the system.


3) Input validation error (CVE-ID: CVE-2024-27880)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in ImageIO. A remote attacker can trick the victim into opening a specially crafted image file and perform a denial of service (DoS) attack.


4) Out-of-bounds read (CVE-ID: CVE-2024-44176)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition in ImageIO. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger an out-of-bounds read error and crash the application.


5) Buffer overflow (CVE-ID: CVE-2024-44169)

The vulnerability allows a local application to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in IOSurfaceAccelerator. A local application can trigger memory corruption and perform a denial of service (DoS) attack.


6) Improper access control (CVE-ID: CVE-2024-44191)

The vulnerability allows a local application to gain access to Bluetooth.

The vulnerability exists due to improper access restrictions in kernel. A local application can gain unauthorized access to Bluetooth.


7) Integer overflow (CVE-ID: CVE-2024-44198)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow in libxml2. A remote attacker can pass specially crafted data to the application, trigger an integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


8) Improper error handling (CVE-ID: CVE-2024-44183)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an logic issue in mDNSResponder when handling errors. A local application can perform a denial of service (DoS) attack.


9) Information disclosure (CVE-ID: CVE-2024-44170)

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to the way Siri stores sensitive information. A local application can access user-sensitive data.


10) Universal cross-site scripting (CVE-ID: CVE-2024-40857)

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


11) Protection Mechanism Failure (CVE-ID: CVE-2024-44187)

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to an error when handling "iframe" elements in WebKit. A remote attacker can exfiltrate data cross-origin.


12) Input validation error (CVE-ID: CVE-2024-44155)

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to improper validation of custom URL scheme in Safari. A remote attacker can trick the victim into visiting a specially crafted website and violate iframe sandboxing policy.


13) Buffer overflow (CVE-ID: CVE-2024-44144)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error when processing files in SceneKit. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger memory corruption and crash the application.


14) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2024-54560)

The vulnerability allows a local application to bypass implemented security restrictions.

The vulnerability exists due to improper privilege management in LaunchServices. A local application can modify other apps without having App Management permission.


15) Information disclosure (CVE-ID: CVE-2024-54467)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a state management issue in WebKit. A remote attacker can trick the victim into visiting a specially crafted webpage and exfiltrate data cross-origin.


16) Input validation error (CVE-ID: CVE-2024-44192)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in WebKit. A remote attacker can trick the victim into visiting a specially crafted webpage and crash the browser.


Remediation

Install update from vendor's website.