CVE-2024-40810: An app may be able to cause a coprocessor crash in Apple macOS
An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in macOS Sonoma 14.6. An app may be able to cause a coprocessor crash.
AI Analysis
Technical Summary
CVE-2024-40810 is a security vulnerability identified in Apple macOS that involves an out-of-bounds write condition within a coprocessor component. This flaw stems from inadequate input validation, which allows a local application with limited privileges to write outside the intended memory boundaries. Such an out-of-bounds write can cause the coprocessor to crash, leading to a denial-of-service (DoS) condition affecting system availability. The vulnerability is classified under CWE-787, which pertains to improper memory handling errors that can corrupt memory and cause unpredictable behavior. The issue was addressed and fixed in macOS Sonoma 14.6 by improving input validation mechanisms to prevent out-of-bounds memory writes. According to the CVSS v3.1 scoring, the vulnerability has a score of 5.5, indicating a medium severity level. The attack vector is local (AV:L), requiring low attack complexity (AC:L) and low privileges (PR:L), but no user interaction (UI:N) is needed. The scope remains unchanged (S:U), and the impact is limited to availability (A:H) with no confidentiality or integrity impact. No public exploits or active exploitation in the wild have been reported to date. This vulnerability primarily poses a risk of service disruption rather than data compromise. Systems running affected versions of macOS prior to 14.6 are vulnerable, and the fix is available through the latest OS update.
Potential Impact
The primary impact of CVE-2024-40810 is on system availability due to the potential for a local app to crash a coprocessor via an out-of-bounds write. This can lead to denial-of-service conditions, potentially disrupting critical operations on affected macOS devices. While confidentiality and integrity are not compromised, the disruption of coprocessor functionality could affect performance or stability of hardware-accelerated tasks, including cryptographic operations or other specialized processing. For organizations relying on macOS devices for business-critical functions, especially those with workflows dependent on coprocessor features, this could result in operational downtime or degraded service quality. The requirement for local privileges and the absence of remote exploitation reduce the risk of widespread attacks but do not eliminate insider threat or malware scenarios where local code execution is possible. Since no known exploits are currently in the wild, the immediate threat is moderate, but unpatched systems remain vulnerable to potential future exploitation. Enterprises with large macOS deployments, particularly in sectors like technology, creative industries, and education, may face increased risk if updates are delayed.
Mitigation Recommendations
To mitigate CVE-2024-40810, organizations should promptly update all macOS devices to version Sonoma 14.6 or later, where the vulnerability is fixed. Given the local privilege requirement, enforcing strict application control policies and limiting installation of untrusted or unnecessary software can reduce the risk of exploitation. Employ endpoint protection solutions that monitor for anomalous local application behavior and memory corruption attempts. Regularly audit and restrict user privileges to minimize the number of accounts capable of executing local code. Additionally, implement system integrity protections and enable macOS security features such as System Integrity Protection (SIP) and Gatekeeper to prevent unauthorized code execution. For environments with sensitive workloads relying on coprocessor functions, consider monitoring system logs for signs of coprocessor crashes or instability. Finally, maintain an up-to-date asset inventory to ensure all macOS endpoints receive timely security patches.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, China, India, Brazil
CVE-2024-40810: An app may be able to cause a coprocessor crash in Apple macOS
Description
An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in macOS Sonoma 14.6. An app may be able to cause a coprocessor crash.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-40810 is a security vulnerability identified in Apple macOS that involves an out-of-bounds write condition within a coprocessor component. This flaw stems from inadequate input validation, which allows a local application with limited privileges to write outside the intended memory boundaries. Such an out-of-bounds write can cause the coprocessor to crash, leading to a denial-of-service (DoS) condition affecting system availability. The vulnerability is classified under CWE-787, which pertains to improper memory handling errors that can corrupt memory and cause unpredictable behavior. The issue was addressed and fixed in macOS Sonoma 14.6 by improving input validation mechanisms to prevent out-of-bounds memory writes. According to the CVSS v3.1 scoring, the vulnerability has a score of 5.5, indicating a medium severity level. The attack vector is local (AV:L), requiring low attack complexity (AC:L) and low privileges (PR:L), but no user interaction (UI:N) is needed. The scope remains unchanged (S:U), and the impact is limited to availability (A:H) with no confidentiality or integrity impact. No public exploits or active exploitation in the wild have been reported to date. This vulnerability primarily poses a risk of service disruption rather than data compromise. Systems running affected versions of macOS prior to 14.6 are vulnerable, and the fix is available through the latest OS update.
Potential Impact
The primary impact of CVE-2024-40810 is on system availability due to the potential for a local app to crash a coprocessor via an out-of-bounds write. This can lead to denial-of-service conditions, potentially disrupting critical operations on affected macOS devices. While confidentiality and integrity are not compromised, the disruption of coprocessor functionality could affect performance or stability of hardware-accelerated tasks, including cryptographic operations or other specialized processing. For organizations relying on macOS devices for business-critical functions, especially those with workflows dependent on coprocessor features, this could result in operational downtime or degraded service quality. The requirement for local privileges and the absence of remote exploitation reduce the risk of widespread attacks but do not eliminate insider threat or malware scenarios where local code execution is possible. Since no known exploits are currently in the wild, the immediate threat is moderate, but unpatched systems remain vulnerable to potential future exploitation. Enterprises with large macOS deployments, particularly in sectors like technology, creative industries, and education, may face increased risk if updates are delayed.
Mitigation Recommendations
To mitigate CVE-2024-40810, organizations should promptly update all macOS devices to version Sonoma 14.6 or later, where the vulnerability is fixed. Given the local privilege requirement, enforcing strict application control policies and limiting installation of untrusted or unnecessary software can reduce the risk of exploitation. Employ endpoint protection solutions that monitor for anomalous local application behavior and memory corruption attempts. Regularly audit and restrict user privileges to minimize the number of accounts capable of executing local code. Additionally, implement system integrity protections and enable macOS security features such as System Integrity Protection (SIP) and Gatekeeper to prevent unauthorized code execution. For environments with sensitive workloads relying on coprocessor functions, consider monitoring system logs for signs of coprocessor crashes or instability. Finally, maintain an up-to-date asset inventory to ensure all macOS endpoints receive timely security patches.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apple
- Date Reserved
- 2024-07-10T17:11:04.694Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69ceb827e6bfc5ba1df6e91b
Added to database: 4/2/2026, 6:40:39 PM
Last enriched: 4/2/2026, 11:30:09 PM
Last updated: 4/3/2026, 5:55:13 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.