Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-27872: An app may be able to access protected user data in Apple macOS

0
Medium
VulnerabilityCVE-2024-27872cvecve-2024-27872
Published: Mon Jul 29 2024 (07/29/2024, 22:16:28 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: macOS

Description

This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Sonoma 14.6. An app may be able to access protected user data.

AI-Powered Analysis

AILast updated: 11/04/2025, 17:57:40 UTC

Technical Analysis

CVE-2024-27872 is a vulnerability in Apple macOS related to improper validation of symbolic links (CWE-61). This flaw allows an application with limited privileges (local access and low privileges) to bypass intended access controls and read protected user data. The vulnerability does not require user interaction and does not affect data integrity or system availability, but it compromises confidentiality by enabling unauthorized data access. The root cause lies in the operating system's failure to properly validate symlinks, which can be manipulated to redirect file access to sensitive locations. Apple addressed this issue in macOS Sonoma 14.6 by enhancing the validation mechanisms for symbolic links, thereby preventing unauthorized data access. The CVSS 3.1 base score is 5.5 (medium severity), reflecting the local attack vector, low complexity, required privileges, and high confidentiality impact. No public exploits have been reported, but the vulnerability poses a risk to any macOS user with local app installation capabilities. Organizations relying on macOS devices should apply the patch promptly to mitigate potential data leakage risks.

Potential Impact

For European organizations, this vulnerability primarily threatens the confidentiality of sensitive user data on macOS devices. Enterprises and government agencies using macOS in their environments could face unauthorized data exposure if an attacker gains local access and installs a malicious app exploiting this flaw. Although the attack requires local access and limited privileges, insider threats or compromised endpoints could leverage this vulnerability to escalate data access. The impact is heightened in sectors with stringent data protection requirements such as finance, healthcare, and public administration. Data breaches resulting from this vulnerability could lead to regulatory penalties under GDPR and damage organizational reputation. Since the vulnerability does not affect integrity or availability, operational disruption is unlikely, but the confidentiality breach risk necessitates urgent mitigation.

Mitigation Recommendations

European organizations should immediately verify macOS versions in use and prioritize upgrading all affected systems to macOS Sonoma 14.6 or later, where the vulnerability is fixed. Restrict local app installation privileges to trusted users and enforce strict endpoint security policies to minimize the risk of malicious app deployment. Employ application whitelisting and endpoint detection and response (EDR) solutions to monitor for suspicious local activity involving symlink manipulation. Conduct regular audits of user permissions and installed applications to detect unauthorized software. Additionally, educate users about the risks of installing untrusted applications and maintain robust physical security controls to prevent unauthorized local access. For organizations with remote macOS users, ensure secure VPN and device management policies to reduce exposure. Finally, monitor Apple security advisories for any updates or emerging exploit reports related to this CVE.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2024-02-26T15:32:28.541Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a3b67ff58c9332ff0a52d

Added to database: 11/4/2025, 5:44:07 PM

Last enriched: 11/4/2025, 5:57:40 PM

Last updated: 12/20/2025, 5:15:59 PM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats