Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-38395: n/a

0
Critical
VulnerabilityCVE-2024-38395cvecve-2024-38395
Published: Sun Jun 16 2024 (06/16/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

In iTerm2 before 3.5.2, the "Terminal may report window title" setting is not honored, and thus remote code execution might occur but "is not trivially exploitable."

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 04:01:43 UTC

Technical Analysis

CVE-2024-38395 is a critical vulnerability identified in iTerm2, a popular terminal emulator for macOS, affecting versions prior to 3.5.2. The vulnerability stems from the improper enforcement of the "Terminal may report window title" setting, which is intended to control whether the terminal window title can be set or reported by remote sources. Due to this misconfiguration, an attacker controlling the remote shell or terminal session can craft malicious input that leads to arbitrary code execution on the victim's machine. The vulnerability is categorized under CWE-94 (Improper Control of Generation of Code), indicating that the application improperly handles code generation or execution. The CVSS v3.1 base score is 9.8, reflecting a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). While the vulnerability is not trivially exploitable, the lack of authentication and user interaction requirements makes it a severe threat. No public exploits or patches have been reported at the time of publication, but the critical severity demands immediate attention from users and administrators. The vulnerability primarily affects macOS systems running iTerm2, which is widely used by developers and IT professionals for terminal access and remote management.

Potential Impact

The impact of CVE-2024-38395 is severe, as it allows remote attackers to execute arbitrary code on vulnerable systems without any authentication or user interaction. Successful exploitation can lead to full system compromise, including unauthorized access to sensitive data, system manipulation, installation of persistent malware, and disruption of services. Given iTerm2's role as a terminal emulator, attackers could leverage this vulnerability to pivot within networks, escalate privileges, or exfiltrate data from critical infrastructure. Organizations relying on macOS environments for development, operations, or remote management are at significant risk. The vulnerability's high CVSS score underscores the potential for widespread damage, especially in environments where iTerm2 is used to access critical servers or cloud infrastructure. Although no known exploits are currently in the wild, the ease of remote exploitation and the critical nature of the flaw necessitate proactive mitigation to prevent future attacks.

Mitigation Recommendations

To mitigate CVE-2024-38395, organizations and users should take the following specific actions: 1) Immediately upgrade iTerm2 to version 3.5.2 or later once the patch is officially released to ensure the "Terminal may report window title" setting is properly enforced. 2) Until a patch is available, restrict network access to iTerm2 sessions by implementing strict firewall rules and network segmentation to limit exposure to untrusted networks or users. 3) Employ endpoint detection and response (EDR) tools to monitor for suspicious process execution or anomalous terminal activity indicative of exploitation attempts. 4) Educate users about the risks of connecting to untrusted remote hosts via iTerm2 and encourage the use of secure, verified connections. 5) Regularly audit and update macOS systems and terminal applications to maintain security hygiene. 6) Consider alternative terminal emulators with robust security controls if immediate patching is not feasible. These targeted mitigations go beyond generic advice by focusing on controlling network exposure, monitoring for exploitation signs, and emphasizing timely patch management specific to iTerm2.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-06-16T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c79b7ef31ef0b564c3c

Added to database: 2/25/2026, 9:41:13 PM

Last enriched: 2/28/2026, 4:01:43 AM

Last updated: 4/11/2026, 8:46:38 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses