CVE-2024-27856

Advisory lineage Upstream: 0 Downstream: 17
Modified
Published: 15 Jan 2025, 19:35
Last modified:02 Apr 2026, 18:18

Vulnerability Summary

Overall Risk (default)
medium
31/100
CVSS Score
7.8 HIGH
v3.1 (cve.org)
EPSS Score
0.03% LOW
0% probability -0.04%
KEV
Not listed
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected

Timeline

15 Jan 2025, 19:35
Published
Vulnerability first disclosed
02 Apr 2026, 18:18
Last Modified
Vulnerability information updated

Description

The issue was addressed with improved checks. This issue is fixed in Safari 17.5, iOS 16.7.8 and iPadOS 16.7.8, iOS 17.5 and iPadOS 17.5, macOS Sonoma 14.5, tvOS 17.5, visionOS 1.2, watchOS 10.5. Processing a file may lead to unexpected app termination or arbitrary code execution.

CVSS Metrics

  • v3.1HIGHScore: 7.8CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS Trends

Current EPSS score: 0.03% Percentile: 7%

Techniques & Countermeasures

  • CWE-94Improper Control of Generation of Code ('Code Injection')

    The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.

Affected Systems

  • appleios and ipados

    ≥ unspecified, < 16.7 | ≥ unspecified, < 17.5 | < 16.7.8 | < 17.5

  • appleipados

    < 16.7.8 | ≥ 17.0, < 17.5

  • appleiphone_os

    < 16.7.8 | ≥ 17.0, < 17.5

  • applemacos

    ≥ unspecified, < 14.5 | < 14.5

  • applesafari

    ≥ unspecified, < 17.5 | < 17.5

  • appletvos

    ≥ unspecified, < 17.5 | < 17.5

  • applevisionos

    ≥ unspecified, < 1.2 | < 1.2

  • applewatchos

    ≥ unspecified, < 10.5 | < 10.5

References (7)