{"vulnerability": "CVE-2024-27823", "sightings": [{"uuid": "11112a09-42a0-4646-9c49-44da15a15a45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27823", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8893", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-27823\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A race condition was addressed with improved locking. This issue is fixed in macOS Sonoma 14.5, iOS 16.7.8 and iPadOS 16.7.8, macOS Ventura 13.6.7, watchOS 10.5, visionOS 1.3, tvOS 17.5, iOS 17.5 and iPadOS 17.5, macOS Monterey 12.7.5. An attacker in a privileged network position may be able to spoof network packets.\n\ud83d\udccf Published: 2024-07-29T22:16:47.880Z\n\ud83d\udccf Modified: 2025-03-26T16:12:56.174Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/HT214101\n2. https://support.apple.com/en-us/HT214100\n3. https://support.apple.com/en-us/HT214107\n4. https://support.apple.com/en-us/HT214106\n5. https://support.apple.com/en-us/HT214105\n6. https://support.apple.com/en-us/HT214104\n7. https://support.apple.com/en-us/HT214123\n8. https://support.apple.com/en-us/HT214102\n9. https://support.apple.com/kb/HT214107\n10. https://support.apple.com/kb/HT214102\n11. https://support.apple.com/kb/HT214104\n12. https://support.apple.com/kb/HT214105\n13. https://support.apple.com/kb/HT214100\n14. https://support.apple.com/kb/HT214106\n15. https://support.apple.com/kb/HT214101\n16. http://seclists.org/fulldisclosure/2024/Jul/23", "creation_timestamp": "2025-03-26T16:25:30.000000Z"}]}