Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-27853: A maliciously crafted ZIP archive may bypass Gatekeeper checks in Apple macOS

0
Medium
VulnerabilityCVE-2024-27853cvecve-2024-27853
Published: Mon Jul 29 2024 (07/29/2024, 22:16:38 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: macOS

Description

CVE-2024-27853 is a medium-severity vulnerability in Apple macOS where a specially crafted ZIP archive can bypass Gatekeeper security checks. Gatekeeper is designed to prevent untrusted software from running, but this flaw allows malicious archives to evade these protections. The issue affects macOS versions prior to Sonoma 14. 4, where the vulnerability has been fixed with improved validation. Exploitation requires local access and user interaction, as the attacker must trick the user into opening the malicious ZIP file. The vulnerability impacts confidentiality and integrity but does not affect availability. There are no known exploits in the wild at this time. Organizations using macOS, especially in environments with high security requirements, should prioritize updating to macOS Sonoma 14. 4 or later to mitigate this risk.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 20:19:18 UTC

Technical Analysis

CVE-2024-27853 is a vulnerability affecting Apple macOS systems prior to version Sonoma 14.4, where a maliciously crafted ZIP archive can bypass the Gatekeeper security mechanism. Gatekeeper is designed to verify the integrity and trustworthiness of downloaded software by checking digital signatures and other metadata before allowing execution. This vulnerability arises from insufficient validation of ZIP archive contents, enabling attackers to craft archives that evade these checks. By bypassing Gatekeeper, malicious software can be executed with fewer barriers, increasing the risk of compromise. The vulnerability does not require privileges or authentication but does require user interaction to open or extract the ZIP archive. The flaw impacts confidentiality and integrity by potentially allowing unauthorized code execution or data manipulation, but it does not affect system availability. Apple addressed this issue by enhancing the validation logic in macOS Sonoma 14.4, ensuring that ZIP archives are properly checked before execution is permitted. No public exploits or active attacks have been reported to date, but the vulnerability poses a risk to any macOS user who opens untrusted ZIP files. The CVSS v3.1 base score is 4.4, reflecting a medium severity with attack vector local, low complexity, no privileges required, user interaction needed, and limited impact on confidentiality and integrity.

Potential Impact

The primary impact of CVE-2024-27853 is the potential for attackers to deliver and execute malicious code on macOS systems by bypassing Gatekeeper protections. This can lead to unauthorized access to sensitive information, data tampering, or installation of persistent malware. While the vulnerability does not directly cause denial of service or system crashes, the compromise of confidentiality and integrity can have serious consequences for individuals and organizations. Enterprises relying on macOS devices for critical operations may face increased risk of targeted attacks if users open malicious ZIP files. The requirement for user interaction limits automated exploitation but does not eliminate risk, especially in phishing or social engineering scenarios. Since Gatekeeper is a key defense layer, its bypass weakens overall endpoint security posture. Organizations with mixed environments that include macOS systems should be aware of this risk and ensure timely patching to prevent potential lateral movement or data breaches.

Mitigation Recommendations

To mitigate CVE-2024-27853, organizations and users should promptly update all macOS devices to version Sonoma 14.4 or later, where the vulnerability is fixed. Until patching is possible, users should exercise caution when handling ZIP archives from untrusted or unknown sources, especially those received via email or downloaded from the internet. Implementing endpoint security solutions that scan compressed files for malicious content can provide an additional layer of defense. Security teams should educate users about the risks of opening unexpected attachments and encourage verification of file origins. Network-level controls such as blocking or quarantining suspicious ZIP files can reduce exposure. Monitoring for unusual file extraction or execution behavior on macOS endpoints can help detect exploitation attempts. Finally, organizations should review and enforce policies restricting software installation and execution privileges to minimize the impact of any successful bypass.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2024-02-26T15:32:28.539Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69ceb825e6bfc5ba1df6e81d

Added to database: 4/2/2026, 6:40:37 PM

Last enriched: 4/2/2026, 8:19:18 PM

Last updated: 4/3/2026, 5:53:24 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses