Cyber Posture

CVE-2024-44227

High

Published: 10 March 2025

Published
10 March 2025
Modified
14 March 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
EPSS Score 0.0032 54.6th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.

Security Summary

CVE-2024-44227 is a memory handling vulnerability that allows an app to cause unexpected system termination or corrupt kernel memory. The issue, associated with CWE-400 (Uncontrolled Resource Consumption), affects iOS and iPadOS versions prior to 18, as well as macOS versions prior to Sequoia 15. Apple addressed the vulnerability through improved memory handling, as detailed in their security updates.

The vulnerability has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N), indicating it is exploitable over a network with low complexity, requiring no privileges or user interaction, and unchanged scope. A remote attacker can leverage a malicious app to achieve high integrity impact, such as kernel memory corruption, potentially leading to system crashes or other disruptions without confidentiality loss or availability impact beyond termination.

Apple's security advisories confirm the fix in iOS 18, iPadOS 18, and macOS Sequoia 15, recommending users update to these versions for mitigation. Additional details are available in the release notes at https://support.apple.com/en-us/121238 and https://support.apple.com/en-us/121250.

Details

CWE(s)
CWE-400

Affected Products

apple
ipados
≤ 18.0
apple
iphone os
≤ 18.0
apple
macos
≤ 15.0

MITRE ATT&CK Enterprise Techniques

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Kernel memory corruption vulnerability directly enables T1068 for potential privilege escalation and T1499.004 for system/application exploitation leading to termination or disruption.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v19.0

References