CVE-2024-44259: An attacker may be able to misuse a trust relationship to download malicious content in Apple visionOS
This issue was addressed through improved state management. This issue is fixed in iOS 17.7.1 and iPadOS 17.7.1, visionOS 2.1, iOS 18.1 and iPadOS 18.1, macOS Sequoia 15.1, Safari 18.1. An attacker may be able to misuse a trust relationship to download malicious content.
CVE-2024-44259: An attacker may be able to misuse a trust relationship to download malicious content in Apple visionOS
Description
This issue was addressed through improved state management. This issue is fixed in iOS 17.7.1 and iPadOS 17.7.1, visionOS 2.1, iOS 18.1 and iPadOS 18.1, macOS Sequoia 15.1, Safari 18.1. An attacker may be able to misuse a trust relationship to download malicious content.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apple
- Date Reserved
- 2024-08-20T21:45:40.786Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69092b7135043901e828ab29
Added to database: 11/3/2025, 10:23:45 PM
Last updated: 11/3/2025, 10:29:13 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-47176: CWE-1327: Binding to an Unrestricted IP Address in OpenPrinting cups-browsed
MediumCVE-2024-47175: CWE-20: Improper Input Validation in OpenPrinting libppd
HighCVE-2024-47076: CWE-20: Improper Input Validation in OpenPrinting libcupsfilters
HighCVE-2024-47072: CWE-121: Stack-based Buffer Overflow in x-stream xstream
HighCVE-2024-46956: n/a
HighActions
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.