- Description
- This issue was addressed with improved checks. This issue is fixed in watchOS 11.2, tvOS 18.2, macOS Sequoia 15.2, iOS 18.2 and iPadOS 18.2, macOS Ventura 13.7.2, macOS Sonoma 14.7.2. An app may be able to access sensitive user data.
- Source
- product-security@apple.com
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 5.5
- Impact score
- 3.6
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
- Severity
- MEDIUM
Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.
- Hype score
1
Threat Alert: macOS Vulnerability CVE-2024-54527 Unveiled: TCC Bypass PoC Exploit Code Release CVE-2024-54527 Severity: ⚠️ Critical Maturity: 💢 Emerging Learn more: https://t.co/lFeDkrU0hz #CyberSecurity #ThreatIntel #InfoSec (1/3)
@fletch_ai
10 Jan 2025
16 Impressions
1 Retweet
1 Like
0 Bookmarks
1 Reply
0 Quotes
macOSにおけるTCC迂回の脆弱性CVE-2024-54527に対応するPoC(攻撃の概念実証コード)が公開された。MediaLibraryService XPCサービスにおける欠陥。 https://t.co/dYdkjFwI3m
@__kokumoto
9 Jan 2025
1088 Impressions
2 Retweets
12 Likes
2 Bookmarks
0 Replies
0 Quotes
A detailed technical and proof-of-concept (PoC) exploit code from security researcher Mickey Jin has unveiled a critical TCC (Transparency, Consent, and Control) bypass vulnerability in macOS, CVE-2024-54527. This vulnerability, affecting the MediaLibraryService XPC service,…
@cybertzar
9 Jan 2025
57 Impressions
0 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
macOS Vulnerability CVE-2024-54527 Unveiled: TCC Bypass PoC Exploit Code Released https://t.co/TJlQnNO2sK
@Dinosn
9 Jan 2025
2294 Impressions
10 Retweets
29 Likes
3 Bookmarks
0 Replies
0 Quotes
macOS Vulnerability CVE-2024-54527 Unveiled: TCC Bypass #PoC Exploit Code Released Explore the details of the CVE-2024-54527 vulnerability in #macOS and understand how attackers can leverage powerful entitlements to bypass TCC protections https://t.co/sgKJVuy0qP
@the_yellow_fall
9 Jan 2025
24 Impressions
0 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "61B67D76-E2DA-46D7-9E43-4E18D542AA57",
"versionEndExcluding": "18.2"
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "02BF92BD-305C-46CA-8A77-C247AF8B1BC0",
"versionEndExcluding": "18.2"
},
{
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "0E37694D-5783-4112-B372-5915C231512F",
"versionEndExcluding": "13.7.2"
},
{
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "617CA14A-5EA4-4112-A564-DB1A5109A066",
"versionEndExcluding": "14.7.2",
"versionStartIncluding": "14.0"
},
{
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "A29E5D37-B333-4B43-9E4A-012CDD2C406D",
"versionEndExcluding": "15.2",
"versionStartIncluding": "15.0"
},
{
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "3B719BB6-424F-4612-8809-0DF25022C29C",
"versionEndExcluding": "18.2"
},
{
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "8C446885-2BC5-454D-88A1-146B17C051C3",
"versionEndExcluding": "11.2"
}
],
"operator": "OR"
}
]
}
]