SB2024030781 - Multiple vulnerabilities in Apple visionOS



SB2024030781 - Multiple vulnerabilities in Apple visionOS

Published: March 7, 2024 Updated: March 23, 2025

Security Bulletin ID SB2024030781
Severity
High
Patch available
YES
Number of vulnerabilities 18
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 39% Medium 11% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 18 secuirty vulnerabilities.


1) Buffer overflow (CVE-ID: CVE-2024-23296)

The vulnerability allows a local application to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in RTKit. A malicious application can trigger memory corruption and execute arbitrary code on the target system.

Note, the vulnerability is being actively exploited in the wild.


2) Security features bypass (CVE-ID: CVE-2024-23284)

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to an error when handling HTML content in WebKit. A remote attacker can trick the victim to visit a specially crafted web page and prevent Content Security Policy from being enforced.


3) Security features bypass (CVE-ID: CVE-2024-23263)

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to an error when handling HTML content in WebKit. A remote attacker can trick the victim to visit a specially crafted web page and prevent Content Security Policy from being enforced.


4) Information disclosure (CVE-ID: CVE-2024-23254)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output in WebKit. A remote attacker can exfiltrate audio data cross-origin.


5) Buffer overflow (CVE-ID: CVE-2024-23226)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing HTML content. A remote attacker can trick the victim to visit a specially crafted website, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


6) Security features bypass (CVE-ID: CVE-2024-23246)

The vulnerability allows a local application to bypass implemented security restrictions.

The vulnerability exists due to an error in UIKit. A local application can break out of its sandbox.


7) Out-of-bounds read (CVE-ID: CVE-2024-23264)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to a boundary error in the Metal Framework library when parsing PVR files. A remote attacker can trick the victim to open a specially crafted PVR file, trigger an out-of-bounds read error and gain access to sensitive information.

8) Buffer overflow (CVE-ID: CVE-2024-23225)

The vulnerability allows a local application to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the OS kernel. A malicious application can trigger memory corruption and execute arbitrary code on the target system.

Note, the vulnerability is being actively exploited in the wild.


9) Buffer overflow (CVE-ID: CVE-2024-23265)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error within the OS kernel. A local application can trigger memory corruption and execute arbitrary code with kernel privileges.


10) Race condition (CVE-ID: CVE-2024-23235)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a race condition within the OS kernel. A local application can exploit the race and gain unauthorized access to sensitive information and escalate privileges on the system.


11) Buffer overflow (CVE-ID: CVE-2024-23286)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in CoreGraphics framework. A remote attacker can create a specially crafted image file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


12) Out-of-bounds read (CVE-ID: CVE-2024-23258)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to a boundary condition in ImageIO. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger an out-of-bounds read error and execute arbitrary code on the system.


13) Out-of-bounds write (CVE-ID: CVE-2024-23257)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing images in ImageIO framework. A remote attacker can create a specially crafted image file, trick the victim into opening it using the affected software, trigger an out-of-bounds write and execute arbitrary code on the target system.


14) Spoofing attack (CVE-ID: CVE-2024-23262)

The vulnerability allows a local application to perform spoofing attack.

The vulnerability exists due to incorrect processing of user-supplied data within the Accessibility feature. A local application can spoof system notifications and UI.


15) Improper Authorization (CVE-ID: CVE-2024-23295)

The vulnerability allows an attacker to bypass authorization process.

The vulnerability exists due to a permissions issue in Persona. An attacker can use an unprotected Persona.


16) Information disclosure (CVE-ID: CVE-2024-23220)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output in Safari when handling cache. A local application can fingerprint the user.


17) Buffer overflow (CVE-ID: CVE-2024-54658)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error when processing HTML content. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger memory corruption and crash the browser.


18) Buffer overflow (CVE-ID: CVE-2024-27859)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing HTML content. A remote attacker can trick the victim to visit a specially crafted website, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install update from vendor's website.