Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://support.apple.com/en-us/120911 |
|
Wed, 11 Dec 2024 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | NVD-CWE-noinfo |
Thu, 24 Oct 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apple
Apple macos |
|
| CPEs | cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Apple
Apple macos |
|
| Metrics |
cvssV3_1
|
Thu, 24 Oct 2024 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6. A person with physical access to an unlocked Mac may be able to gain root code execution. | |
| References |
|
Status: PUBLISHED
Assigner: apple
Published:
Updated: 2026-04-02T18:16:38.873Z
Reserved: 2024-08-20T21:42:05.920Z
Link: CVE-2024-44141
Updated: 2024-10-24T18:11:45.092Z
Status : Analyzed
Published: 2024-10-24T17:15:16.390
Modified: 2024-12-11T18:29:33.870
Link: CVE-2024-44141
No data.
OpenCVE Enrichment
No data.