This document describes the security content of macOS Sonoma 14.7.2.
For our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available. Recent releases are listed on the Apple security releases page.
Apple security documents reference vulnerabilities by CVE-ID when possible.
For more information about security, see the Apple Product Security page.
Released December 11, 2024
Available for: macOS Sonoma
Impact: Photos in the Hidden Photos Album may be viewed without authentication
Description: A logic issue was addressed with improved file handling.
CVE-2024-54488: Benjamin Hornbeck, Skadz (@skadz108), Chi Yuan Chang of ZUSO ART and taikosoup
Entry added January 27, 2025
Available for: macOS Sonoma
Impact: An app may be able to access user-sensitive data
Description: This issue was addressed through improved state management.
CVE-2024-54541: Arsenii Kostromin (0x3c3e) and an anonymous researcher
Entry added January 27, 2025
Available for: macOS Sonoma
Impact: An app may be able to access user-sensitive data
Description: The issue was addressed with improved checks.
CVE-2024-54477: Mickey Jin (@patch1t), Csaba Fitzl (@theevilbit) of Kandji
Available for: macOS Sonoma
Impact: Parsing a maliciously crafted video file may lead to unexpected system termination
Description: The issue was addressed with improved memory handling.
CVE-2024-44220: D4m0n
Available for: macOS Sonoma
Impact: An app may be able to access sensitive user data
Description: This issue was addressed with improved checks.
CVE-2024-54527: Mickey Jin (@patch1t)
Available for: macOS Sonoma
Impact: A malicious app may be able to access private information
Description: The issue was addressed with improved checks.
CVE-2024-54526: Mickey Jin (@patch1t), Arsenii Kostromin (0x3c3e)
Available for: macOS Sonoma
Impact: An app may be able to cause unexpected system termination or write kernel memory
Description: An out-of-bounds write issue was addressed with improved input validation.
CVE-2024-54509: CertiK SkyFall Team
Entry added January 27, 2025
Available for: macOS Sonoma
Impact: An app may be able to execute arbitrary code out of its sandbox or with certain elevated privileges
Description: A logic issue was addressed with improved checks.
CVE-2024-54529: Dillon Franke working with Google Project Zero
Entry updated May 28, 2025
Available for: macOS Sonoma
Impact: An app may be able to access protected user data
Description: A logic issue was addressed with improved file handling.
CVE-2024-44300: an anonymous researcher
Available for: macOS Sonoma
Impact: An encrypted volume may be accessed by a different user without prompting for the password
Description: An authorization issue was addressed with improved state management.
CVE-2024-54466: Michael Cohen
Available for: macOS Sonoma
Impact: Running a mount command may unexpectedly execute arbitrary code
Description: A path handling issue was addressed with improved validation.
CVE-2024-54489: D’Angelo Gonzalez of CrowdStrike
Available for: macOS Sonoma
Impact: An app may be able to access protected user data
Description: The issue was addressed with improved checks.
CVE-2024-54547: Rodolphe BRUNETTI (@eisw0lf) of Lupus Nova
Entry added January 27, 2025
Available for: macOS Sonoma
Impact: An app may be able to read sensitive location information
Description: The issue was resolved by sanitizing logging.
CVE-2024-54519: Kirin (@Pwnrin) and 7feilee
Entry added January 27, 2025
Available for: macOS Sonoma
Impact: Processing a maliciously crafted font may result in the disclosure of process memory
Description: The issue was addressed with improved checks.
CVE-2024-54486: Hossein Lotfi (@hosselot) of Trend Micro Zero Day Initiative
Available for: macOS Sonoma
Impact: Processing maliciously crafted web content may lead to an unexpected process crash
Description: An out-of-bounds access issue was addressed with improved bounds checking.
CVE-2024-54478: Gary Kwong
Entry added January 27, 2025
Available for: macOS Sonoma
Impact: Processing a maliciously crafted image may result in disclosure of process memory
Description: The issue was addressed with improved checks.
CVE-2024-54500: Junsung Lee working with Trend Micro Zero Day Initiative
Available for: macOS Sonoma
Impact: An app may be able to break out of its sandbox
Description: The issue was addressed with improved checks.
CVE-2024-54468: an anonymous researcher
Entry added January 27, 2025
Available for: macOS Sonoma
Impact: An attacker may be able to create a read-only memory mapping that can be written to
Description: A race condition was addressed with additional validation.
CVE-2024-54494: sohybbyk
Available for: macOS Sonoma
Impact: An app may be able to leak sensitive kernel state
Description: A race condition was addressed with improved locking.
CVE-2024-54510: Joseph Ravichandran (@0xjprx) of MIT CSAIL
Available for: macOS Sonoma
Impact: An app may be able to cause unexpected system termination or corrupt kernel memory
Description: The issue was addressed with improved memory handling.
CVE-2024-44245: an anonymous researcher
Available for: macOS Sonoma
Impact: Processing a malicious crafted file may lead to a denial-of-service
Description: The issue was addressed with improved memory handling.
CVE-2024-44201: Ben Roeder
Available for: macOS Sonoma
Impact: A remote attacker may cause an unexpected app termination or arbitrary code execution
Description: This is a vulnerability in open source code and Apple Software is among the affected projects. The CVE-ID was assigned by a third party. Learn more about the issue and CVE-ID at cve.org.
CVE-2024-45490
Available for: macOS Sonoma
Impact: An app may be able to break out of its sandbox
Description: The issue was addressed with improved checks.
CVE-2024-54514: an anonymous researcher
Available for: macOS Sonoma
Impact: An app may be able to gain elevated privileges
Description: A logic issue was addressed with improved checks.
CVE-2024-44225: 风沐云烟(@binary_fmyy)
Available for: macOS Sonoma
Impact: An app may be able to access user-sensitive data
Description: The issue was addressed with improved checks.
CVE-2024-54474: Mickey Jin (@patch1t)
CVE-2024-54476: Mickey Jin (@patch1t), Bohdan Stasiuk (@Bohdan_Stasiuk)
Available for: macOS Sonoma
Impact: An app may be able to read and write files outside of its sandbox
Description: This issue was addressed with additional entitlement checks.
CVE-2024-54537: Mickey Jin (@patch1t)
Entry added January 27, 2025
Available for: macOS Sonoma
Impact: Processing a maliciously crafted file may lead to a denial of service
Description: The issue was addressed with improved checks.
CVE-2024-54501: Michael DePlante (@izobashi) of Trend Micro's Zero Day Initiative
Available for: macOS Sonoma
Impact: A user with screen sharing access may be able to view another user's screen
Description: This issue was addressed through improved state management.
CVE-2024-44248: Halle Winkler, Politepix (theoffcuts.org)
Available for: macOS Sonoma
Impact: An attacker may gain access to protected parts of the file system
Description: A logic issue was addressed with improved restrictions.
CVE-2024-54557: an anonymous researcher
Entry added January 27, 2025
Available for: macOS Sonoma
Impact: An app may be able to approve a launch daemon without user consent
Description: A permissions issue was addressed with additional restrictions.
CVE-2024-54516: Arsenii Kostromin (0x3c3e) and an anonymous researcher
Entry added January 27, 2025
Available for: macOS Sonoma
Impact: An app may be able to overwrite arbitrary files
Description: A logic issue was addressed with improved restrictions.
CVE-2024-54528: an anonymous researcher
Available for: macOS Sonoma
Impact: An app may be able to break out of its sandbox
Description: A path handling issue was addressed with improved validation.
CVE-2024-54498: an anonymous researcher
Available for: macOS Sonoma
Impact: A malicious app may be able to gain root privileges
Description: A logic issue was addressed with improved file handling.
CVE-2024-44291: Arsenii Kostromin (0x3c3e)
Available for: macOS Sonoma
Impact: A malicious app may be able to gain root privileges
Description: A permissions issue was addressed with additional restrictions.
CVE-2024-44224: Amy (@asentientbot)
Available for: macOS Sonoma
Impact: An app may be able to modify protected parts of the file system
Description: The issue was addressed with improved permissions logic.
CVE-2024-54495: Claudio Bozzato and Francesco Benvenuto of Cisco Talos, Arsenii Kostromin (0x3c3e)
Available for: macOS Sonoma
Impact: An app may be able to overwrite arbitrary files
Description: A path handling issue was addressed with improved validation.
CVE-2024-54520: Rodolphe BRUNETTI (@eisw0lf)
Entry added January 27, 2025
Available for: macOS Sonoma
Impact: An app may be able to determine a user’s current location
Description: A privacy issue was addressed with improved private data redaction for log entries.
CVE-2024-54475: Kirin (@Pwnrin)
Entry added January 27, 2025
Available for: macOS Sonoma
Impact: Processing a maliciously crafted file may lead to heap corruption
Description: This is a vulnerability in open source code and Apple Software is among the affected projects. The CVE-ID was assigned by a third party. Learn more about the issue and CVE-ID at cve.org.
CVE-2024-45306
Entry added January 27, 2025
Available for: macOS Sonoma
Impact: An app may be able to capture keyboard events from the lock screen
Description: This issue was addressed through improved state management.
CVE-2024-54539: Halle Winkler, Politepix theoffcuts.org, and Trent @lathiat Lloyd
Entry added January 27, 2025
We would like to acknowledge evilsocket for their assistance.
We would like to acknowledge Junming C. (@Chapoly1305) and Prof. Qiang Zeng of George Mason University for their assistance.
We would like to acknowledge IES Red Team of ByteDance for their assistance.