The Apple Security Update December 2024 addresses flaws in Safari, macOS Sonoma, macOS Ventura, and macOS Sequoia. These flaws might allow attackers to execute arbitrary code, access sensitive data, or gain elevated privileges. The updates address issues in components like AppleMobileFileIntegrity, Audio, Kernel, and many more. The patches are important to protect macOS devices from potential security threats and provide better performance and privacy.
Summary of December Updates:
1. Safari
- Affected Product : Safari before 18.2
- Affected OS: macOS Ventura and macOS Sonoma
- Affected features: WebKit
- Impact: UI spoofing, unexpected process crash, cross-site scripting attack.
- CVEs: CVE-2024-54534, CVE-2024-54505, CVE-2024-54508, CVE-2024-54502, CVE-2024-54479, CVE-2024-44246
2. macOS
- Affected OS : macOS Sequoia before 15.2
- Affected features : Apple Software Restore, AppleGraphicsControl, AppleMobileFileIntegrity, Audio, Crash Reporter, DiskArbitration, Disk Utility, FontParser, Foundation, ImageIO, IOMobileFrameBuffer, Kernel, LaunchServices, libexpat, libxpc, Logging, MediaRemote, Notification Center, PackageKit, Passwords, Perl, Safari, SceneKit, SharedFileList, Shortcuts, StorageKit, Swift, and WebKit.
- Impact: Privilege escalation, Arbitrary Code Execution, Information Disclosure, and Memory Corruption etc.
- CVEs: CVE-2024-54477, CVE-2024-44220, CVE-2024-54526, CVE-2024-54527, CVE-2024-54529, CVE-2024-54513, CVE-2024-44300, CVE-2024-54466, CVE-2024-54489, CVE-2024-54486, CVE-2024-44291, CVE-2024-54500, CVE-2024-54506, CVE-2024-54494, CVE-2024-54510, CVE-2024-44245, CVE-2024-54531, CVE-2024-45490, CVE-2024-54514, CVE-2024-44225, CVE-2024-54491, CVE-2024-54484, CVE-2024-54504, CVE-2024-54474, CVE-2024-54476, CVE-2024-44243, CVE-2024-44246, CVE-2024-54515, CVE-2024-54528, CVE-2024-54498, CVE-2024-44224, CVE-2024-54505, CVE-2024-54534.
- Affected OS: macOS Sonoma before 14.7.2
- Affected features: Apple Software Restore, AppleGraphicsControl, AppleMobileFileIntegrity, Audio, Crash Reporter, DiskArbitration, Disk Utility, FontParser, ImageIO, Kernel, libarchive, libexpat, libxpc, PackageKit, SceneKit, Screen Sharing Server, SharedFileList, Software Update, StorageKit, Swift.
- Impact: Arbitrary Code Execution, Information Disclosure, and Memory Corruption
- CVEs:CVE-2024-54477, CVE-2024-44220, CVE-2024-54527, CVE-2024-54526, CVE-2024-54529, CVE-2024-44300, CVE-2024-54466, CVE-2024-54489, CVE-2024-54486, CVE-2024-54500, CVE-2024-54494, CVE-2024-54510, CVE-2024-44245, CVE-2024-44201, CVE-2024-45490, CVE-2024-54514, CVE-2024-44225, CVE-2024-54474, CVE-2024-54476, CVE-2024-54501, CVE-2024-44248, CVE-2024-54528, CVE-2024-54498, CVE-2024-44291, CVE-2024-44224, CVE-2024-54495.
- Affected OS: macOS Ventura before 13.7.2
- Affected features: Apple Software Restore, AppleMobileFileIntegrity, Audio, Crash Reporter, DiskArbitration, Disk Utility, FontParser, ImageIO, Kernel, libarchive, libexpat, libxpc, PackageKit, SceneKit, Screen Sharing Server, SharedFileList, Software Update, and StorageKit.
- Impact: Arbitrary Code Execution, Information Disclosure, and Memory Corruption
- CVEs: CVE-2024-54477, CVE-2024-54527, CVE-2024-54526, CVE-2024-54529, CVE-2024-44300, CVE-2024-54466, CVE-2024-54489, CVE-2024-54486, CVE-2024-54500, CVE-2024-54494, CVE-2024-54510, CVE-2024-44201, CVE-2024-45490, CVE-2024-54514, CVE-2024-44225, CVE-2024-54474, CVE-2024-54476, CVE-2024-54501, CVE-2024-44248, CVE-2024-54528, CVE-2024-54498, CVE-2024-44291, CVE-2024-44224.
Fixes introduced in : Safari 18.2 , macOS Sequoia 15.2, macOS Sonoma 14.7.2 & macOS Ventura 13.7.2 for their respective versions.
SanerNow Contiunous Vulnerability and Exposure Management
SecPod SanerNow CVEM is an all-in-one vulnerability and patch management solution that automatically detects, assesses, prioritizes, and remediates vulnerabilities across your network. Supporting all major operating systems and over 550 third-party applications, SanerNow ensures comprehensive protection. With SanerNow, you can test patches before deployment, rollback if necessary, and fully automate the patching process, reducing the workload for your IT and security teams while keeping your systems secure.