Lucene search

K
appleAppleAPPLE:B547B63963AEA48937F1C7ADC64160EA
HistoryMar 21, 2024 - 12:00 a.m.

About the security content of visionOS 1.1.1

2024-03-2100:00:00
support.apple.com
3
visionos
1.1.1
coremedia
webrtc
security update
out-of-bounds write
apple vision pro
cve-2024-1580
nick galloway
google project zero
published date

5.9 Medium

CVSS3

Attack Vector

ADJACENT

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L

6.5 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.2%

About the security content of visionOS 1.1.1

This document describes the security content of visionOS 1.1.1.

About Apple security updates

For our customers’ protection, Apple doesn’t disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available. Recent releases are listed on the Apple security releases page.

Apple security documents reference vulnerabilities by CVE-ID when possible.

For more information about security, see the Apple Product Security page.

visionOS 1.1.1

Released March 21, 2024

CoreMedia

Available for: Apple Vision Pro

Impact: Processing an image may lead to arbitrary code execution

Description: An out-of-bounds write issue was addressed with improved input validation.

CVE-2024-1580: Nick Galloway of Google Project Zero

WebRTC

Available for: Apple Vision Pro

Impact: Processing an image may lead to arbitrary code execution

Description: An out-of-bounds write issue was addressed with improved input validation.

CVE-2024-1580: Nick Galloway of Google Project Zero

Information about products not manufactured by Apple, or independent websites not controlled or tested by Apple, is provided without recommendation or endorsement. Apple assumes no responsibility with regard to the selection, performance, or use of third-party websites or products. Apple makes no representations regarding third-party website accuracy or reliability. Contact the vendor for additional information.

Published Date: June 03, 2024

Affected configurations

Vulners
Node
applevisionosRange<1.1.1
CPENameOperatorVersion
visionoslt1.1.1

5.9 Medium

CVSS3

Attack Vector

ADJACENT

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L

6.5 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.2%