Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-23285: An app may be able to create symlinks to protected regions of the disk in Apple macOS

0
High
VulnerabilityCVE-2024-23285cvecve-2024-23285
Published: Fri Mar 08 2024 (03/08/2024, 01:35:31 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: macOS

Description

This issue was addressed with improved handling of symlinks. This issue is fixed in macOS Sonoma 14.4. An app may be able to create symlinks to protected regions of the disk.

AI-Powered Analysis

AILast updated: 11/04/2025, 19:25:08 UTC

Technical Analysis

CVE-2024-23285 is a vulnerability identified in Apple macOS that allows an application with limited privileges to create symbolic links (symlinks) pointing to protected regions of the disk. Symbolic links are filesystem objects that point to other files or directories. Improper handling of symlinks can lead to security issues such as unauthorized access or modification of protected files. This vulnerability stems from insufficient validation or control over symlink creation by apps, enabling them to bypass normal access controls and potentially manipulate or access sensitive system files or directories. The vulnerability is classified under CWE-61, which relates to improper handling of symbolic links. It affects macOS versions prior to Sonoma 14.4, where Apple has implemented improved symlink handling to address the issue. The CVSS v3.1 base score is 7.8, indicating a high severity level. The vector indicates that exploitation requires local access (AV:L), low attack complexity (AC:L), low privileges (PR:L), no user interaction (UI:N), and impacts confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits are reported in the wild, the potential for significant system compromise exists if exploited. This vulnerability could be leveraged by malicious local applications or attackers who gain limited access to escalate privileges or disrupt system operations.

Potential Impact

For European organizations, this vulnerability poses a significant risk, particularly those relying on macOS devices for critical business functions, intellectual property, or sensitive data storage. Successful exploitation could allow attackers to access or modify protected system files, leading to data breaches, system instability, or denial of service. This could disrupt operations, cause financial losses, and damage reputations. Organizations in sectors such as finance, healthcare, government, and technology are especially vulnerable due to the sensitive nature of their data and the regulatory requirements for data protection. The local attack vector means that insider threats or attackers who have gained initial footholds on devices could escalate their privileges and expand their control. Given the high impact on confidentiality, integrity, and availability, the vulnerability could facilitate advanced persistent threats or ransomware attacks targeting European enterprises.

Mitigation Recommendations

The primary mitigation is to upgrade all affected macOS systems to version Sonoma 14.4 or later, where the vulnerability has been fixed with improved symlink handling. Organizations should enforce strict patch management policies to ensure timely updates. Additionally, audit and restrict application permissions to limit the ability of apps to create symlinks, especially those from untrusted sources. Employ endpoint protection solutions that monitor and alert on suspicious filesystem activities, including unusual symlink creation. Implement strict access controls and user privilege management to minimize the risk of local privilege escalation. Regularly review and harden macOS security configurations, including System Integrity Protection (SIP) and Apple’s privacy controls. Educate users about the risks of installing untrusted software and the importance of reporting unusual system behavior. Finally, maintain comprehensive logging and monitoring to detect potential exploitation attempts early.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2024-01-12T22:22:21.499Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a47576d939959c8022c27

Added to database: 11/4/2025, 6:35:03 PM

Last enriched: 11/4/2025, 7:25:08 PM

Last updated: 12/15/2025, 3:39:12 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats