Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-23265: An app may be able to cause unexpected system termination or write kernel memory in Apple visionOS

0
Critical
VulnerabilityCVE-2024-23265cvecve-2024-23265
Published: Fri Mar 08 2024 (03/08/2024, 01:35:55 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: visionOS

Description

A memory corruption vulnerability was addressed with improved locking. This issue is fixed in macOS Monterey 12.7.4, macOS Ventura 13.6.5, macOS Sonoma 14.4, visionOS 1.1, iOS 17.4 and iPadOS 17.4, watchOS 10.4, iOS 16.7.6 and iPadOS 16.7.6, tvOS 17.4. An app may be able to cause unexpected system termination or write kernel memory.

AI-Powered Analysis

AILast updated: 11/04/2025, 19:29:56 UTC

Technical Analysis

CVE-2024-23265 is a critical memory corruption vulnerability identified in Apple visionOS and several other Apple operating systems including macOS Monterey 12.7.4 and later, macOS Ventura 13.6.5 and later, macOS Sonoma 14.4, iOS 17.4 and iPadOS 17.4, watchOS 10.4, iOS 16.7.6 and iPadOS 16.7.6, and tvOS 17.4. The vulnerability stems from improper locking in kernel memory management, which can be exploited by an unprivileged application to cause unexpected system termination (crashes) or to write arbitrary data into kernel memory. This can lead to full system compromise, including arbitrary code execution with kernel privileges, resulting in complete loss of confidentiality, integrity, and availability of the affected device. The flaw requires no user interaction and no prior privileges, making it highly exploitable remotely or locally by malicious apps. Apple addressed this issue by improving locking mechanisms in the kernel to prevent memory corruption. The vulnerability is assigned a CVSS v3.1 score of 9.8, reflecting its critical nature. Although no exploits have been reported in the wild yet, the severity and ease of exploitation make it a significant threat. The vulnerability affects a broad range of Apple products, including the newly introduced visionOS, which powers Apple's mixed reality headset, increasing the attack surface. This vulnerability is categorized under CWE-400, indicating a resource exhaustion or memory corruption issue. Organizations relying on Apple ecosystems should urgently apply the provided patches to mitigate risks.

Potential Impact

For European organizations, the impact of CVE-2024-23265 is substantial due to the widespread use of Apple devices in enterprise and consumer environments. Exploitation could allow attackers to gain kernel-level control over affected devices, leading to data breaches, persistent malware installation, and disruption of critical services. The ability to cause system crashes or corrupt kernel memory can result in denial of service, loss of sensitive information, and compromise of device integrity. Organizations in sectors such as finance, healthcare, government, and technology that utilize Apple hardware and software are at heightened risk. The inclusion of visionOS expands the threat to emerging mixed reality platforms, which may be used in specialized professional applications. Given the vulnerability requires no privileges or user interaction, the attack vector is broad, increasing the likelihood of exploitation if devices remain unpatched. This could undermine trust in Apple devices and disrupt business operations across Europe.

Mitigation Recommendations

European organizations should immediately deploy the latest Apple security updates that address CVE-2024-23265 across all affected platforms, including visionOS, macOS, iOS, iPadOS, watchOS, and tvOS. Beyond patching, organizations should implement strict application vetting policies to prevent installation of untrusted or malicious apps, especially on visionOS devices. Employ mobile device management (MDM) solutions to enforce update compliance and monitor device integrity. Network segmentation and endpoint detection and response (EDR) tools can help detect anomalous kernel-level activities indicative of exploitation attempts. Organizations should also educate users about the risks of installing unverified applications and maintain robust backup and recovery procedures to mitigate potential data loss from system crashes. Monitoring Apple security advisories for any emerging exploit reports is critical to adapt defenses promptly. For high-value targets, consider restricting use of vulnerable Apple devices until patches are applied.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2024-01-12T22:22:21.490Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a47536d939959c80228a4

Added to database: 11/4/2025, 6:34:59 PM

Last enriched: 11/4/2025, 7:29:56 PM

Last updated: 12/19/2025, 6:44:11 AM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats