Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-44265: An attacker with physical access can input Game Controller events to apps running on a locked device in Apple macOS

0
High
VulnerabilityCVE-2024-44265cvecve-2024-44265
Published: Mon Oct 28 2024 (10/28/2024, 21:08:04 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: macOS

Description

The issue was addressed by restricting options offered on a locked device. This issue is fixed in macOS Sequoia 15.1, macOS Sonoma 14.7.1, macOS Ventura 13.7.1. An attacker with physical access can input Game Controller events to apps running on a locked device.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 00:06:29 UTC

Technical Analysis

CVE-2024-44265 is a vulnerability discovered in Apple macOS that allows an attacker with physical access to a locked device to inject Game Controller input events into applications running on the device without unlocking it. This issue stems from insufficient restrictions on input event handling when the device is locked, classified under CWE-862 (Missing Authorization). The vulnerability enables an attacker to interact with apps, potentially extracting sensitive information or triggering unintended behaviors, thereby compromising confidentiality. The CVSS v3.1 base score is 7.5, indicating high severity, with an attack vector of network (though physical access is required), low attack complexity, no privileges required, and no user interaction needed. The scope is unchanged, and the impact is high on confidentiality but none on integrity or availability. Apple fixed this vulnerability by limiting the input options available on locked devices in macOS Sequoia 15.1, Sonoma 14.7.1, and Ventura 13.7.1. No known exploits have been reported in the wild as of the publication date. The vulnerability highlights a risk in scenarios where attackers can physically access locked macOS devices and use game controllers to bypass input restrictions.

Potential Impact

The primary impact of CVE-2024-44265 is unauthorized input injection on locked macOS devices, potentially leading to confidentiality breaches. Attackers could manipulate applications to reveal sensitive information or perform actions without user consent. This risk is particularly critical in environments where devices are left unattended or physically accessible, such as public spaces, offices, or shared workstations. Although the vulnerability does not affect integrity or availability, the ability to interact with apps on a locked device undermines the security model of macOS lock screens. Organizations with high-value data on macOS endpoints may face increased risk of data leakage or unauthorized access. The lack of known exploits reduces immediate threat but does not eliminate the potential for future attacks, especially as physical access is a common attack vector in targeted scenarios.

Mitigation Recommendations

To mitigate CVE-2024-44265, organizations should promptly update affected macOS systems to versions Sequoia 15.1, Sonoma 14.7.1, or Ventura 13.7.1 or later, where the vulnerability is patched. Beyond patching, physical security controls are critical: restrict unauthorized physical access to devices, use secure enclosures or cable locks, and implement policies for device handling in public or shared environments. Disable or restrict use of external game controllers on sensitive devices if not required. Employ endpoint detection and response (EDR) solutions to monitor unusual input events or application behaviors. Educate users about the risks of leaving devices unattended and encourage use of strong lock screen passwords and biometric protections. Regularly audit device configurations and access logs to detect potential exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2024-08-20T21:45:40.788Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092b7135043901e828ab51

Added to database: 11/3/2025, 10:23:45 PM

Last enriched: 4/3/2026, 12:06:29 AM

Last updated: 5/9/2026, 2:53:30 PM

Views: 123

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses