CVE-2024-44265: An attacker with physical access can input Game Controller events to apps running on a locked device in Apple macOS
The issue was addressed by restricting options offered on a locked device. This issue is fixed in macOS Sequoia 15.1, macOS Sonoma 14.7.1, macOS Ventura 13.7.1. An attacker with physical access can input Game Controller events to apps running on a locked device.
AI Analysis
Technical Summary
CVE-2024-44265 is a vulnerability discovered in Apple macOS that allows an attacker with physical access to a locked device to inject Game Controller input events into applications running on the device without unlocking it. This issue stems from insufficient restrictions on input event handling when the device is locked, classified under CWE-862 (Missing Authorization). The vulnerability enables an attacker to interact with apps, potentially extracting sensitive information or triggering unintended behaviors, thereby compromising confidentiality. The CVSS v3.1 base score is 7.5, indicating high severity, with an attack vector of network (though physical access is required), low attack complexity, no privileges required, and no user interaction needed. The scope is unchanged, and the impact is high on confidentiality but none on integrity or availability. Apple fixed this vulnerability by limiting the input options available on locked devices in macOS Sequoia 15.1, Sonoma 14.7.1, and Ventura 13.7.1. No known exploits have been reported in the wild as of the publication date. The vulnerability highlights a risk in scenarios where attackers can physically access locked macOS devices and use game controllers to bypass input restrictions.
Potential Impact
The primary impact of CVE-2024-44265 is unauthorized input injection on locked macOS devices, potentially leading to confidentiality breaches. Attackers could manipulate applications to reveal sensitive information or perform actions without user consent. This risk is particularly critical in environments where devices are left unattended or physically accessible, such as public spaces, offices, or shared workstations. Although the vulnerability does not affect integrity or availability, the ability to interact with apps on a locked device undermines the security model of macOS lock screens. Organizations with high-value data on macOS endpoints may face increased risk of data leakage or unauthorized access. The lack of known exploits reduces immediate threat but does not eliminate the potential for future attacks, especially as physical access is a common attack vector in targeted scenarios.
Mitigation Recommendations
To mitigate CVE-2024-44265, organizations should promptly update affected macOS systems to versions Sequoia 15.1, Sonoma 14.7.1, or Ventura 13.7.1 or later, where the vulnerability is patched. Beyond patching, physical security controls are critical: restrict unauthorized physical access to devices, use secure enclosures or cable locks, and implement policies for device handling in public or shared environments. Disable or restrict use of external game controllers on sensitive devices if not required. Employ endpoint detection and response (EDR) solutions to monitor unusual input events or application behaviors. Educate users about the risks of leaving devices unattended and encourage use of strong lock screen passwords and biometric protections. Regularly audit device configurations and access logs to detect potential exploitation attempts.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, China, India
CVE-2024-44265: An attacker with physical access can input Game Controller events to apps running on a locked device in Apple macOS
Description
The issue was addressed by restricting options offered on a locked device. This issue is fixed in macOS Sequoia 15.1, macOS Sonoma 14.7.1, macOS Ventura 13.7.1. An attacker with physical access can input Game Controller events to apps running on a locked device.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-44265 is a vulnerability discovered in Apple macOS that allows an attacker with physical access to a locked device to inject Game Controller input events into applications running on the device without unlocking it. This issue stems from insufficient restrictions on input event handling when the device is locked, classified under CWE-862 (Missing Authorization). The vulnerability enables an attacker to interact with apps, potentially extracting sensitive information or triggering unintended behaviors, thereby compromising confidentiality. The CVSS v3.1 base score is 7.5, indicating high severity, with an attack vector of network (though physical access is required), low attack complexity, no privileges required, and no user interaction needed. The scope is unchanged, and the impact is high on confidentiality but none on integrity or availability. Apple fixed this vulnerability by limiting the input options available on locked devices in macOS Sequoia 15.1, Sonoma 14.7.1, and Ventura 13.7.1. No known exploits have been reported in the wild as of the publication date. The vulnerability highlights a risk in scenarios where attackers can physically access locked macOS devices and use game controllers to bypass input restrictions.
Potential Impact
The primary impact of CVE-2024-44265 is unauthorized input injection on locked macOS devices, potentially leading to confidentiality breaches. Attackers could manipulate applications to reveal sensitive information or perform actions without user consent. This risk is particularly critical in environments where devices are left unattended or physically accessible, such as public spaces, offices, or shared workstations. Although the vulnerability does not affect integrity or availability, the ability to interact with apps on a locked device undermines the security model of macOS lock screens. Organizations with high-value data on macOS endpoints may face increased risk of data leakage or unauthorized access. The lack of known exploits reduces immediate threat but does not eliminate the potential for future attacks, especially as physical access is a common attack vector in targeted scenarios.
Mitigation Recommendations
To mitigate CVE-2024-44265, organizations should promptly update affected macOS systems to versions Sequoia 15.1, Sonoma 14.7.1, or Ventura 13.7.1 or later, where the vulnerability is patched. Beyond patching, physical security controls are critical: restrict unauthorized physical access to devices, use secure enclosures or cable locks, and implement policies for device handling in public or shared environments. Disable or restrict use of external game controllers on sensitive devices if not required. Employ endpoint detection and response (EDR) solutions to monitor unusual input events or application behaviors. Educate users about the risks of leaving devices unattended and encourage use of strong lock screen passwords and biometric protections. Regularly audit device configurations and access logs to detect potential exploitation attempts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apple
- Date Reserved
- 2024-08-20T21:45:40.788Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69092b7135043901e828ab51
Added to database: 11/3/2025, 10:23:45 PM
Last enriched: 4/3/2026, 12:06:29 AM
Last updated: 5/9/2026, 2:53:30 PM
Views: 123
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.