Search for vulnerabilities
Vulnerability details: VCID-j72p-jrp9-8yew
Vulnerability ID VCID-j72p-jrp9-8yew
Aliases CVE-2024-23206
Summary An access issue was addressed with improved access restrictions. This issue is fixed in watchOS 10.3, tvOS 17.3, iOS 17.3 and iPadOS 17.3, macOS Sonoma 14.3, iOS 16.7.5 and iPadOS 16.7.5, Safari 17.3. A maliciously crafted webpage may be able to fingerprint the user.
Status Published
Exploitability 0.5
Weighted Severity 5.9
Risk 3.0
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
System Score Found at
cvssv3 6.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23206.json
epss 0.00516 https://api.first.org/data/v1/epss?cve=CVE-2024-23206
epss 0.00516 https://api.first.org/data/v1/epss?cve=CVE-2024-23206
epss 0.00516 https://api.first.org/data/v1/epss?cve=CVE-2024-23206
epss 0.00516 https://api.first.org/data/v1/epss?cve=CVE-2024-23206
epss 0.00516 https://api.first.org/data/v1/epss?cve=CVE-2024-23206
epss 0.00516 https://api.first.org/data/v1/epss?cve=CVE-2024-23206
epss 0.00516 https://api.first.org/data/v1/epss?cve=CVE-2024-23206
epss 0.00516 https://api.first.org/data/v1/epss?cve=CVE-2024-23206
epss 0.00516 https://api.first.org/data/v1/epss?cve=CVE-2024-23206
epss 0.00516 https://api.first.org/data/v1/epss?cve=CVE-2024-23206
epss 0.00516 https://api.first.org/data/v1/epss?cve=CVE-2024-23206
epss 0.00516 https://api.first.org/data/v1/epss?cve=CVE-2024-23206
epss 0.00516 https://api.first.org/data/v1/epss?cve=CVE-2024-23206
epss 0.00516 https://api.first.org/data/v1/epss?cve=CVE-2024-23206
epss 0.00516 https://api.first.org/data/v1/epss?cve=CVE-2024-23206
epss 0.00516 https://api.first.org/data/v1/epss?cve=CVE-2024-23206
epss 0.00516 https://api.first.org/data/v1/epss?cve=CVE-2024-23206
epss 0.00516 https://api.first.org/data/v1/epss?cve=CVE-2024-23206
cvssv3.1 6.5 http://seclists.org/fulldisclosure/2024/Jan/27
ssvc Track http://seclists.org/fulldisclosure/2024/Jan/27
cvssv3.1 6.5 http://seclists.org/fulldisclosure/2024/Jan/33
ssvc Track http://seclists.org/fulldisclosure/2024/Jan/33
cvssv3.1 6.5 http://seclists.org/fulldisclosure/2024/Jan/34
ssvc Track http://seclists.org/fulldisclosure/2024/Jan/34
cvssv3.1 6.5 http://seclists.org/fulldisclosure/2024/Jan/36
ssvc Track http://seclists.org/fulldisclosure/2024/Jan/36
cvssv3.1 6.5 http://seclists.org/fulldisclosure/2024/Jan/39
ssvc Track http://seclists.org/fulldisclosure/2024/Jan/39
cvssv3.1 6.5 http://seclists.org/fulldisclosure/2024/Jan/40
ssvc Track http://seclists.org/fulldisclosure/2024/Jan/40
cvssv3.1 6.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 6.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/US43EQFC2IS66EA2CPAZFH2RQ6WD7PKF/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/US43EQFC2IS66EA2CPAZFH2RQ6WD7PKF/
cvssv3.1 6.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X2VJMEDT4GL42AQVHSYOT6DIVJDZWIV4/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X2VJMEDT4GL42AQVHSYOT6DIVJDZWIV4/
cvssv3.1 6.5 https://nvd.nist.gov/vuln/detail/CVE-2024-23206
cvssv3.1 6.5 https://support.apple.com/en-us/HT214055
ssvc Track https://support.apple.com/en-us/HT214055
cvssv3.1 6.5 https://support.apple.com/en-us/HT214056
ssvc Track https://support.apple.com/en-us/HT214056
cvssv3.1 6.5 https://support.apple.com/en-us/HT214059
ssvc Track https://support.apple.com/en-us/HT214059
cvssv3.1 6.5 https://support.apple.com/en-us/HT214060
ssvc Track https://support.apple.com/en-us/HT214060
cvssv3.1 6.5 https://support.apple.com/en-us/HT214061
ssvc Track https://support.apple.com/en-us/HT214061
cvssv3.1 6.5 https://support.apple.com/en-us/HT214063
ssvc Track https://support.apple.com/en-us/HT214063
cvssv3.1 6.5 https://support.apple.com/kb/HT214055
ssvc Track https://support.apple.com/kb/HT214055
cvssv3.1 6.5 https://support.apple.com/kb/HT214056
ssvc Track https://support.apple.com/kb/HT214056
cvssv3.1 6.5 https://support.apple.com/kb/HT214059
ssvc Track https://support.apple.com/kb/HT214059
cvssv3.1 6.5 https://support.apple.com/kb/HT214060
ssvc Track https://support.apple.com/kb/HT214060
cvssv3.1 6.5 https://support.apple.com/kb/HT214061
ssvc Track https://support.apple.com/kb/HT214061
cvssv3.1 6.5 https://support.apple.com/kb/HT214063
ssvc Track https://support.apple.com/kb/HT214063
cvssv3.1 6.5 http://www.openwall.com/lists/oss-security/2024/02/05/8
ssvc Track http://www.openwall.com/lists/oss-security/2024/02/05/8
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23206.json
https://api.first.org/data/v1/epss?cve=CVE-2024-23206
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23206
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23213
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23271
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2269743 https://bugzilla.redhat.com/show_bug.cgi?id=2269743
27 http://seclists.org/fulldisclosure/2024/Jan/27
33 http://seclists.org/fulldisclosure/2024/Jan/33
34 http://seclists.org/fulldisclosure/2024/Jan/34
36 http://seclists.org/fulldisclosure/2024/Jan/36
39 http://seclists.org/fulldisclosure/2024/Jan/39
40 http://seclists.org/fulldisclosure/2024/Jan/40
8 http://www.openwall.com/lists/oss-security/2024/02/05/8
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
CVE-2024-23206 https://nvd.nist.gov/vuln/detail/CVE-2024-23206
HT214055 https://support.apple.com/en-us/HT214055
HT214055 https://support.apple.com/kb/HT214055
HT214056 https://support.apple.com/en-us/HT214056
HT214056 https://support.apple.com/kb/HT214056
HT214059 https://support.apple.com/en-us/HT214059
HT214059 https://support.apple.com/kb/HT214059
HT214060 https://support.apple.com/en-us/HT214060
HT214060 https://support.apple.com/kb/HT214060
HT214061 https://support.apple.com/en-us/HT214061
HT214061 https://support.apple.com/kb/HT214061
HT214063 https://support.apple.com/en-us/HT214063
HT214063 https://support.apple.com/kb/HT214063
US43EQFC2IS66EA2CPAZFH2RQ6WD7PKF https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/US43EQFC2IS66EA2CPAZFH2RQ6WD7PKF/
USN-6631-1 https://usn.ubuntu.com/6631-1/
X2VJMEDT4GL42AQVHSYOT6DIVJDZWIV4 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X2VJMEDT4GL42AQVHSYOT6DIVJDZWIV4/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23206.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Found at http://seclists.org/fulldisclosure/2024/Jan/27
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/ Found at http://seclists.org/fulldisclosure/2024/Jan/27
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Found at http://seclists.org/fulldisclosure/2024/Jan/33
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/ Found at http://seclists.org/fulldisclosure/2024/Jan/33
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Found at http://seclists.org/fulldisclosure/2024/Jan/34
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/ Found at http://seclists.org/fulldisclosure/2024/Jan/34
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Found at http://seclists.org/fulldisclosure/2024/Jan/36
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/ Found at http://seclists.org/fulldisclosure/2024/Jan/36
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Found at http://seclists.org/fulldisclosure/2024/Jan/39
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/ Found at http://seclists.org/fulldisclosure/2024/Jan/39
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Found at http://seclists.org/fulldisclosure/2024/Jan/40
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/ Found at http://seclists.org/fulldisclosure/2024/Jan/40
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/US43EQFC2IS66EA2CPAZFH2RQ6WD7PKF/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/US43EQFC2IS66EA2CPAZFH2RQ6WD7PKF/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X2VJMEDT4GL42AQVHSYOT6DIVJDZWIV4/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X2VJMEDT4GL42AQVHSYOT6DIVJDZWIV4/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2024-23206
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Found at https://support.apple.com/en-us/HT214055
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/ Found at https://support.apple.com/en-us/HT214055
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Found at https://support.apple.com/en-us/HT214056
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/ Found at https://support.apple.com/en-us/HT214056
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Found at https://support.apple.com/en-us/HT214059
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/ Found at https://support.apple.com/en-us/HT214059
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Found at https://support.apple.com/en-us/HT214060
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/ Found at https://support.apple.com/en-us/HT214060
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Found at https://support.apple.com/en-us/HT214061
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/ Found at https://support.apple.com/en-us/HT214061
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Found at https://support.apple.com/en-us/HT214063
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/ Found at https://support.apple.com/en-us/HT214063
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Found at https://support.apple.com/kb/HT214055
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/ Found at https://support.apple.com/kb/HT214055
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Found at https://support.apple.com/kb/HT214056
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/ Found at https://support.apple.com/kb/HT214056
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Found at https://support.apple.com/kb/HT214059
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/ Found at https://support.apple.com/kb/HT214059
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Found at https://support.apple.com/kb/HT214060
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/ Found at https://support.apple.com/kb/HT214060
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Found at https://support.apple.com/kb/HT214061
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/ Found at https://support.apple.com/kb/HT214061
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Found at https://support.apple.com/kb/HT214063
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/ Found at https://support.apple.com/kb/HT214063
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Found at http://www.openwall.com/lists/oss-security/2024/02/05/8
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/ Found at http://www.openwall.com/lists/oss-security/2024/02/05/8
Exploit Prediction Scoring System (EPSS)
Percentile 0.65697
EPSS Score 0.00516
Published At July 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:41:23.872180+00:00 Ubuntu USN Importer Import https://usn.ubuntu.com/6631-1/ 37.0.0