Analyzing CVE-2024-44243, a macOS System Integrity Protection bypass through kernel extensions | Microsoft Security Blog
Tags
Common Information
Type | Value |
---|---|
UUID | 5d46fadf-1324-4ce1-ab04-3982108c3de5 |
Fingerprint | b681899667b7f385 |
Analysis status | DONE |
Considered CTI value | 2 |
Text language | |
Published | Jan. 13, 2025, 9 a.m. |
Added to db | Jan. 14, 2025, 3:21 a.m. |
Last updated | Feb. 6, 2025, 7:48 p.m. |
Headline | Analyzing CVE-2024-44243, a macOS System Integrity Protection bypass through kernel extensions |
Title | Analyzing CVE-2024-44243, a macOS System Integrity Protection bypass through kernel extensions | Microsoft Security Blog |
Detected Hints/Tags/Attributes | 45/1/11 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 338 | ✔ | Microsoft Security Blog | https://www.microsoft.com/security/blog/feed/ | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | CVE | 16 | cve-2024-44243 |
|
Details | CVE | 2 | cve-2022-26712 |
|
Details | CVE | 3 | cve-2019-8561 |
|
Details | CVE | 3 | cve-2020-9854 |
|
Details | CVE | 12 | cve-2021-30892 |
|
Details | CVE | 4 | cve-2022-22583 |
|
Details | CVE | 20 | cve-2023-32369 |
|
Details | CVE | 6 | cve-2022-26706 |
|
Details | Domain | 392 | com.apple |
|
Details | Domain | 125 | aka.ms |
|
Details | Url | 31 | https://aka.ms/threatintelblog. |