This page was not yet optimized for use on mobile devices.
CVE-2024-44225
Data ?
Vulnerability ID | CVE-2024-44225 |
---|---|
Published on | 12.12.2024 02:15 |
Severity | HIGH |
Vulnerable configurations ?
-
cpe:2.3:o:apple:ipados:-:*:*:*:*:*:*:*,
cpe:2.3:o:apple:ipados:12.1:*:*:*:*:*:*:*,
cpe:2.3:o:apple:ipados:12.1.1:*:*:*:*:*:*:*,
cpe:2.3:o:apple:ipados:12.1.3:*:*:*:*:*:*:*,
cpe:2.3:o:apple:ipados:12.2:*:*:*:*:*:*:*,
cpe:2.3:o:apple:ipados:12.3:*:*:*:*:*:*:*,
cpe:2.3:o:apple:ipados:12.4:*:*:*:*:*:*:*,
cpe:2.3:o:apple:ipados:13.1:*:*:*:*:*:*:*,
cpe:2.3:o:apple:ipados:13.1.1:*:*:*:*:*:*:*,
cpe:2.3:o:apple:ipados:13.1.2:*:*:*:*:*:*:*,
…
Vulnerable certificates ?
The CVE was matched to the following certificates. This means the vulnerability likely affects said certified devices. However, this is an automated process that may have false positives and negatives.
Common Criteria certificates Display network
- Strong customer authentication pour Apple Pay sur Apple Watch série 4 exécutant watchOS 7.4.1 (Version 18T201)
- Apple macOS 13 Ventura
- Strong Customer Authentication pour Apple Pay sur Apple Watch avec S7 exécutant watchOS 8.5.1 (Version 8.5.1 (build 19T252))
- Strong Customer Authentication for Apple Pay on Apple Watch with S8 running watchOS 9.4(watchOS 9.4 (build 20T253)) ( ANSSI-CC-2023/60)
- Apple macOS 13 Ventura: FileVault
- Strong Customer Authentication for Apple Pay, on MacBook Air 2022 with M2 running macOS Ventura 13.3.1
- Strong Customer Authentication for Apple Pay on Mac mini with M2 and Magic keyboard with Touch ID, running macOS Ventura 13.3.1 , macOS Ventura 13.3.1 (build 22E261) ( ANSSI-CC-2023/61)
- Strong Customer Authentication for Apple Pay on Mac mini with M2 Pro and Magic keyboard with Touch ID running macOS Sonoma 14.4(macOS Sonoma 14.4 (build 23E214)) (ANSSI-CC-2024/42)
- Strong Customer Authentication for Apple Pay on Apple Watch with S9 running watchOS 10.4(watchOS 10.4 (build 21T216))