About the security content of macOS Ventura 13.7

This document describes the security content of macOS Ventura 13.7.

About Apple security updates

For our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available. Recent releases are listed on the Apple security releases page.

Apple security documents reference vulnerabilities by CVE-ID when possible.

For more information about security, see the Apple Product Security page.

macOS Ventura 13.7

Released September 16, 2024

Accounts

Available for: macOS Ventura

Impact: An app may be able to leak sensitive user information

Description: The issue was addressed with improved checks.

CVE-2024-44129

App Intents

Available for: macOS Ventura

Impact: An app may be able to access sensitive data logged when a shortcut fails to launch another app

Description: This issue was addressed with improved redaction of sensitive information.

CVE-2024-44182: Kirin (@Pwnrin)

AppKit

Available for: macOS Ventura

Impact: An unprivileged app may be able to log keystrokes in other apps including those using secure input mode

Description: A logic issue was addressed with improved restrictions.

CVE-2024-27886: Stephan Casas, an anonymous researcher

AppleMobileFileIntegrity

Available for: macOS Ventura

Impact: An app may be able to access sensitive user data

Description: The issue was addressed with additional code-signing restrictions.

CVE-2024-40847: Mickey Jin (@patch1t)

AppleMobileFileIntegrity

Available for: macOS Ventura

Impact: An app may be able to bypass Privacy preferences

Description: A downgrade issue was addressed with additional code-signing restrictions.

CVE-2024-40814: Mickey Jin (@patch1t)

AppleMobileFileIntegrity

Available for: macOS Ventura

Impact: An app may be able to bypass Privacy preferences

Description: This issue was addressed with improved checks.

CVE-2024-44164: Mickey Jin (@patch1t)

AppleMobileFileIntegrity

Available for: macOS Ventura

Impact: An app may be able to modify protected parts of the file system

Description: A library injection issue was addressed with additional restrictions.

CVE-2024-44168: Claudio Bozzato and Francesco Benvenuto of Cisco Talos

AppleMobileFileIntegrity

Available for: macOS Ventura

Impact: An attacker may be able to read sensitive information

Description: A downgrade issue was addressed with additional code-signing restrictions.

CVE-2024-40848: Mickey Jin (@patch1t)

Automator

Available for: macOS Ventura

Impact: An Automator Quick Action workflow may be able to bypass Gatekeeper

Description: This issue was addressed by adding an additional prompt for user consent.

CVE-2024-44128: Anton Boegler

bless

Available for: macOS Ventura

Impact: An app may be able to modify protected parts of the file system

Description: A permissions issue was addressed with additional restrictions.

CVE-2024-44151: Mickey Jin (@patch1t)

Compression

Available for: macOS Ventura

Impact: Unpacking a maliciously crafted archive may allow an attacker to write arbitrary files

Description: A race condition was addressed with improved locking.

CVE-2024-27876: Snoolie Keffaber (@0xilis)

Dock

Available for: macOS Ventura

Impact: An app may be able to access user-sensitive data

Description: A privacy issue was addressed by removing sensitive data.

CVE-2024-44177: an anonymous researcher

Game Center

Available for: macOS Ventura

Impact: An app may be able to access user-sensitive data

Description: A file access issue was addressed with improved input validation.

CVE-2024-40850: Denis Tokarev (@illusionofcha0s)

ImageIO

Available for: macOS Ventura

Impact: Processing an image may lead to a denial-of-service

Description: An out-of-bounds access issue was addressed with improved bounds checking.

CVE-2024-44176: dw0r of ZeroPointer Lab working with Trend Micro Zero Day Initiative, an anonymous researcher

Intel Graphics Driver

Available for: macOS Ventura

Impact: Processing a maliciously crafted texture may lead to unexpected app termination

Description: A buffer overflow issue was addressed with improved memory handling.

CVE-2024-44160: Michael DePlante (@izobashi) of Trend Micro Zero Day Initiative

Intel Graphics Driver

Available for: macOS Ventura

Impact: Processing a maliciously crafted texture may lead to unexpected app termination

Description: An out-of-bounds read was addressed with improved bounds checking.

CVE-2024-44161: Michael DePlante (@izobashi) of Trend Micro Zero Day Initiative

IOSurfaceAccelerator

Available for: macOS Ventura

Impact: An app may be able to cause unexpected system termination

Description: The issue was addressed with improved memory handling.

CVE-2024-44169: Antonio Zekić

Kernel

Available for: macOS Ventura

Impact: Network traffic may leak outside a VPN tunnel

Description: A logic issue was addressed with improved checks.

CVE-2024-44165: Andrew Lytvynov

Mail Accounts

Available for: macOS Ventura

Impact: An app may be able to access information about a user's contacts

Description: A privacy issue was addressed with improved private data redaction for log entries.

CVE-2024-40791: Rodolphe BRUNETTI (@eisw0lf)

Maps

Available for: macOS Ventura

Impact: An app may be able to read sensitive location information

Description: An issue was addressed with improved handling of temporary files.

CVE-2024-44181: Kirin(@Pwnrin) and LFY(@secsys) from Fudan University

mDNSResponder

Available for: macOS Ventura

Impact: An app may be able to cause a denial-of-service

Description: A logic error was addressed with improved error handling.

CVE-2024-44183: Olivier Levon

Notes

Available for: macOS Ventura

Impact: An app may be able to overwrite arbitrary files

Description: This issue was addressed by removing the vulnerable code.

CVE-2024-44167: ajajfxhj

PackageKit

Available for: macOS Ventura

Impact: An app may be able to modify protected parts of the file system

Description: This issue was addressed with improved validation of symlinks.

CVE-2024-44178: Mickey Jin (@patch1t)

Safari

Available for: macOS Ventura

Impact: Visiting a malicious website may lead to user interface spoofing

Description: This issue was addressed through improved state management.

CVE-2024-40797: Rifa'i Rejal Maynando

Sandbox

Available for: macOS Ventura

Impact: A malicious application may be able to access private information

Description: The issue was addressed with improved checks.

CVE-2024-44163: Zhongquan Li (@Guluisacat)

Shortcuts

Available for: macOS Ventura

Impact: A shortcut may output sensitive user data without consent

Description: This issue was addressed with improved redaction of sensitive information.

CVE-2024-44158: Kirin (@Pwnrin)

Shortcuts

Available for: macOS Ventura

Impact: An app may be able to observe data displayed to the user by Shortcuts

Description: A privacy issue was addressed with improved handling of temporary files.

CVE-2024-40844: Kirin (@Pwnrin) and luckyu (@uuulucky) of NorthSea

System Settings

Available for: macOS Ventura

Impact: An app may be able to access user-sensitive data

Description: A privacy issue was addressed with improved private data redaction for log entries.

CVE-2024-44166: Kirin (@Pwnrin) and LFY (@secsys) from Fudan University

System Settings

Available for: macOS Ventura

Impact: An app may be able to read arbitrary files

Description: A path handling issue was addressed with improved validation.

CVE-2024-44190: Rodolphe BRUNETTI (@eisw0lf)

Transparency

Available for: macOS Ventura

Impact: An app may be able to access user-sensitive data

Description: A permissions issue was addressed with additional restrictions.

CVE-2024-44184: Bohdan Stasiuk (@Bohdan_Stasiuk)

Additional recognition

Airport

We would like to acknowledge David Dudok de Wit for their assistance.

Information about products not manufactured by Apple, or independent websites not controlled or tested by Apple, is provided without recommendation or endorsement. Apple assumes no responsibility with regard to the selection, performance, or use of third-party websites or products. Apple makes no representations regarding third-party website accuracy or reliability. Contact the vendor for additional information.

Published Date: