CVE-2024-54568
BaseFortify
Publication date: 2025-08-29
Last updated on: 2025-09-02
Assigner: Apple Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apple | macos | From 15.0 (inc) to 15.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-120 | The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves improper memory handling when parsing a maliciously crafted file, which can cause an unexpected termination of the application. It has been fixed in macOS Sequoia 15.2 by improving memory handling.
How can this vulnerability impact me? :
If exploited, this vulnerability can cause an application to unexpectedly terminate, potentially disrupting normal operations or causing denial of service.
What immediate steps should I take to mitigate this vulnerability?
Update your system to macOS Sequoia 15.2 or later, as the issue is fixed in this version. Avoid opening or parsing files from untrusted sources that may be maliciously crafted until the update is applied.