Vulnerability Details CVE-2024-44294
A path deletion vulnerability was addressed by preventing vulnerable code from running with privileges. This issue is fixed in macOS Sequoia 15.1, macOS Sonoma 14.7.1, macOS Ventura 13.7.1. An attacker with root privileges may be able to delete protected system files.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 33.0%
CVSS Severity
CVSS v3 Score 6.5
Products affected by CVE-2024-44294
-
-
cpe:2.3:o:apple:macos:1.0
-
cpe:2.3:o:apple:macos:10.15.7
-
cpe:2.3:o:apple:macos:11.0
-
cpe:2.3:o:apple:macos:11.0.1
-
cpe:2.3:o:apple:macos:11.1
-
cpe:2.3:o:apple:macos:11.1.0
-
cpe:2.3:o:apple:macos:11.2
-
cpe:2.3:o:apple:macos:11.2.1
-
cpe:2.3:o:apple:macos:11.3
-
cpe:2.3:o:apple:macos:11.3.1
-
cpe:2.3:o:apple:macos:11.4
-
cpe:2.3:o:apple:macos:11.5
-
cpe:2.3:o:apple:macos:11.5.1
-
cpe:2.3:o:apple:macos:11.6
-
cpe:2.3:o:apple:macos:11.6.1
-
cpe:2.3:o:apple:macos:11.6.2
-
cpe:2.3:o:apple:macos:11.6.3
-
cpe:2.3:o:apple:macos:11.6.5
-
cpe:2.3:o:apple:macos:11.6.6
-
cpe:2.3:o:apple:macos:11.6.7
-
cpe:2.3:o:apple:macos:11.6.8
-
cpe:2.3:o:apple:macos:11.7
-
cpe:2.3:o:apple:macos:11.7.1
-
cpe:2.3:o:apple:macos:11.7.10
-
cpe:2.3:o:apple:macos:11.7.2
-
cpe:2.3:o:apple:macos:11.7.3
-
cpe:2.3:o:apple:macos:11.7.5
-
cpe:2.3:o:apple:macos:11.7.6
-
cpe:2.3:o:apple:macos:11.7.7
-
cpe:2.3:o:apple:macos:11.7.8
-
cpe:2.3:o:apple:macos:11.7.9
-
cpe:2.3:o:apple:macos:12.0
-
cpe:2.3:o:apple:macos:12.0.0
-
cpe:2.3:o:apple:macos:12.0.1
-
cpe:2.3:o:apple:macos:12.1
-
cpe:2.3:o:apple:macos:12.2
-
cpe:2.3:o:apple:macos:12.2.1
-
cpe:2.3:o:apple:macos:12.3
-
cpe:2.3:o:apple:macos:12.3.1
-
cpe:2.3:o:apple:macos:12.4
-
cpe:2.3:o:apple:macos:12.5
-
cpe:2.3:o:apple:macos:12.5.1
-
cpe:2.3:o:apple:macos:12.6
-
cpe:2.3:o:apple:macos:12.6.1
-
cpe:2.3:o:apple:macos:12.6.2
-
cpe:2.3:o:apple:macos:12.6.3
-
cpe:2.3:o:apple:macos:12.6.4
-
cpe:2.3:o:apple:macos:12.6.5
-
cpe:2.3:o:apple:macos:12.6.6
-
cpe:2.3:o:apple:macos:12.6.7
-
cpe:2.3:o:apple:macos:12.6.8
-
cpe:2.3:o:apple:macos:12.6.9
-
cpe:2.3:o:apple:macos:12.7
-
cpe:2.3:o:apple:macos:12.7.1
-
cpe:2.3:o:apple:macos:12.7.2
-
cpe:2.3:o:apple:macos:12.7.3
-
cpe:2.3:o:apple:macos:12.7.4
-
cpe:2.3:o:apple:macos:12.7.5
-
cpe:2.3:o:apple:macos:12.7.6
-
cpe:2.3:o:apple:macos:13.0
-
cpe:2.3:o:apple:macos:13.0.0
-
cpe:2.3:o:apple:macos:13.0.1
-
cpe:2.3:o:apple:macos:13.1
-
cpe:2.3:o:apple:macos:13.2
-
cpe:2.3:o:apple:macos:13.2.1
-
cpe:2.3:o:apple:macos:13.3
-
cpe:2.3:o:apple:macos:13.3.1
-
cpe:2.3:o:apple:macos:13.3.3
-
cpe:2.3:o:apple:macos:13.4
-
cpe:2.3:o:apple:macos:13.4.1
-
cpe:2.3:o:apple:macos:13.5
-
cpe:2.3:o:apple:macos:13.5.2
-
cpe:2.3:o:apple:macos:13.6
-
cpe:2.3:o:apple:macos:13.6.1
-
cpe:2.3:o:apple:macos:13.6.2
-
cpe:2.3:o:apple:macos:13.6.3
-
cpe:2.3:o:apple:macos:13.6.4
-
cpe:2.3:o:apple:macos:13.6.5
-
cpe:2.3:o:apple:macos:13.6.6
-
cpe:2.3:o:apple:macos:13.6.7
-
cpe:2.3:o:apple:macos:13.6.8
-
cpe:2.3:o:apple:macos:13.7
-
cpe:2.3:o:apple:macos:14.0
-
cpe:2.3:o:apple:macos:14.1
-
cpe:2.3:o:apple:macos:14.1.1
-
cpe:2.3:o:apple:macos:14.1.2
-
cpe:2.3:o:apple:macos:14.2
-
cpe:2.3:o:apple:macos:14.2.1
-
cpe:2.3:o:apple:macos:14.3
-
cpe:2.3:o:apple:macos:14.4
-
cpe:2.3:o:apple:macos:14.4.1
-
cpe:2.3:o:apple:macos:14.5
-
cpe:2.3:o:apple:macos:14.6
-
cpe:2.3:o:apple:macos:14.7
-
cpe:2.3:o:apple:macos:7.5.3
-
cpe:2.3:o:apple:macos:7.6
-
cpe:2.3:o:apple:macos:7.6.1
-
cpe:2.3:o:apple:macos:8.0
-
cpe:2.3:o:apple:macos:8.1
-
cpe:2.3:o:apple:macos:8.5
-
cpe:2.3:o:apple:macos:8.6
-
-
cpe:2.3:o:apple:macos:9.0