CVE-2024-44128

5.5 MEDIUM
Published: September 17, 2024 Modified: November 04, 2025

Description

This issue was addressed by adding an additional prompt for user consent. This issue is fixed in macOS Ventura 13.7, macOS Sonoma 14.7, macOS Sequoia 15. An Automator Quick Action workflow may be able to bypass Gatekeeper.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://support.apple.com/en-us/121234
Source: product-security@apple.com
Release Notes Vendor Advisory
https://support.apple.com/en-us/121238
Source: product-security@apple.com
Release Notes Vendor Advisory
https://support.apple.com/en-us/121247
Source: product-security@apple.com
Release Notes Vendor Advisory
http://seclists.org/fulldisclosure/2024/Sep/33
Source: af854a3a-2127-422b-91ae-364da2661108
http://seclists.org/fulldisclosure/2024/Sep/40
Source: af854a3a-2127-422b-91ae-364da2661108
http://seclists.org/fulldisclosure/2024/Sep/41
Source: af854a3a-2127-422b-91ae-364da2661108

6 reference(s) from NVD

Quick Stats

CVSS v3 Score
5.5 / 10.0
EPSS (Exploit Probability)
0.0%
2th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

apple