Cyber Posture

CVE-2024-40771

High

Published: 15 January 2025

Published
15 January 2025
Modified
02 April 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0005 16.8th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-40771 is a high-severity Incorrect Authorization (CWE-863) vulnerability in Apple Macos. Its CVSS base score is 7.8 (High).

Operationally, ranked at the 16.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SC-39 (Process Isolation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely flaw remediation through patching, directly addressing the kernel memory handling vulnerability fixed in CVE-2024-40771.

prevent

Implements memory protection methods that counter memory corruption exploits enabling arbitrary kernel code execution from apps as in CVE-2024-40771.

prevent

Enforces process isolation to prevent user-space applications from accessing or executing in kernel memory space via vulnerabilities like CVE-2024-40771.

NVD Description

The issue was addressed with improved memory handling. This issue is fixed in iOS 16.7.8 and iPadOS 16.7.8, iOS 17.5 and iPadOS 17.5, macOS Monterey 12.7.5, macOS Sonoma 14.5, macOS Ventura 13.6.7, tvOS 17.5, visionOS 1.2, watchOS 10.5. An app…

more

may be able to execute arbitrary code with kernel privileges.

Deeper analysisAI

CVE-2024-40771 is a memory handling vulnerability affecting the kernel in multiple Apple operating systems, including iOS and iPadOS prior to versions 16.7.8 and 17.5, macOS Monterey prior to 12.7.5, macOS Sonoma prior to 14.5, macOS Ventura prior to 13.6.7, tvOS prior to 17.5, visionOS prior to 1.2, and watchOS prior to 10.5. The issue allows an app to execute arbitrary code with kernel privileges and is associated with CWE-863 (Incorrect Authorization), though detailed CWE mapping is unavailable from NVD.

Exploitation requires local access (AV:L) with low privileges (PR:L), such as a malicious app installed and executed by a user, and features low attack complexity (AC:L) with no user interaction required (UI:N). Successful attacks achieve high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H) without scope change (S:U), earning a CVSS v3.1 base score of 7.8. This enables full kernel compromise from a local app context.

Apple's security advisories, detailed at support.apple.com/en-us/120898 through 120902, state that the vulnerability was addressed via improved memory handling in the listed patched versions. Security practitioners should prioritize updating affected devices to these releases for mitigation.

Details

CWE(s)

Affected Products

apple
ipados
≤ 16.7.8 · 17.0 — 17.5
apple
iphone os
≤ 16.7.8 · 17.0 — 17.5
apple
macos
≤ 13.6.7 · 12.0 — 12.7.5 · 13.0 — 13.6.7
apple
tvos
≤ 17.5
apple
visionos
≤ 1.2

CVEs Like This One

CVE-2024-54530Same product: Apple Ipados
CVE-2025-24221Same product: Apple Ipados
CVE-2025-24230Same product: Apple Ipados
CVE-2025-31281Same product: Apple Ipados
CVE-2025-24243Same product: Apple Ipados
CVE-2025-24211Same product: Apple Ipados
CVE-2025-24173Same product: Apple Ipados
CVE-2025-30471Same product: Apple Ipados
CVE-2025-30426Same product: Apple Ipados
CVE-2025-31182Same product: Apple Ipados

References