CVE-2024-44213: An attacker in a privileged network position may be able to leak sensitive user information in Apple macOS
An issue existed in the parsing of URLs. This issue was addressed with improved input validation. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. An attacker in a privileged network position may be able to leak sensitive user information.
CVE-2024-44213: An attacker in a privileged network position may be able to leak sensitive user information in Apple macOS
Description
An issue existed in the parsing of URLs. This issue was addressed with improved input validation. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. An attacker in a privileged network position may be able to leak sensitive user information.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apple
- Date Reserved
- 2024-08-20T21:42:05.944Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690929a3fe7723195e0fd277
Added to database: 11/3/2025, 10:16:03 PM
Last updated: 11/3/2025, 10:17:39 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-4032: Vulnerability in Python Software Foundation CPython
HighCVE-2024-40867: A remote attacker may be able to break out of Web Content sandbox in Apple iOS and iPadOS
HighCVE-2024-40866: Visiting a malicious website may lead to address bar spoofing in Apple macOS
MediumCVE-2024-40855: A sandboxed app may be able to access sensitive user data in Apple macOS
MediumCVE-2024-40851: An attacker with physical access may be able to access contact photos from the lock screen in Apple iOS and iPadOS
LowActions
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.