- Description
- A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 18.1 and iPadOS 18.1, watchOS 11.1, visionOS 2.1, tvOS 18.1. An app may be able to cause unexpected system termination or corrupt kernel memory.
- Source
- product-security@apple.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- Hype score
- Not currently trending
Proof of concept for iOS 18.0.x bug CVE-2024-44285 released, but seems unlikely to aid jailbreaking https://t.co/ba8WsP4Wip
@iDownloadBlog
1 Dec 2024
2735 Impressions
3 Retweets
7 Likes
1 Bookmark
0 Replies
0 Quotes
GitHub - 34306/IOSurface_poc18: App with PoC of CVE-2024-44285 https://t.co/KFwK7CKHaw
@akaclandestine
30 Nov 2024
1585 Impressions
5 Retweets
19 Likes
4 Bookmarks
0 Replies
0 Quotes
I’ve been told that my online activity has been dead for years, so after a friend’s suggestion, I’ve made a simple PoC with a little description for CVE-2024-44285: https://t.co/wGzNS6VgvU
@tomitokics
29 Nov 2024
3548 Impressions
6 Retweets
29 Likes
8 Bookmarks
2 Replies
1 Quote
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "C1AEAF56-49F9-4F1F-993C-97ECD7BDA012",
"versionEndExcluding": "18.1",
"versionStartIncluding": "18.0"
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "748B3415-F0B7-4677-B6C7-3EC7CFA8CCA5",
"versionEndExcluding": "18.1",
"versionStartIncluding": "18.0"
},
{
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "5D57FCAE-9B33-4532-BC69-BC3D35719EDB",
"versionEndExcluding": "18.1"
},
{
"criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "15E4723D-CD2B-4486-A69C-27F843844A80",
"versionEndExcluding": "2.1"
},
{
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "5DB9A303-7D3D-4167-9F28-64AA4B1EC0E1",
"versionEndExcluding": "11.1"
}
],
"operator": "OR"
}
]
}
]