{"vulnerability": "CVE-2024-40771", "sightings": [{"uuid": "74a494bd-15c8-4975-9835-78212579380b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40771", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113839291442592456", "content": "", "creation_timestamp": "2025-01-16T17:48:56.238526Z"}, {"uuid": "f49c799c-a202-4385-b920-49629a235f4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40771", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113834073031505621", "content": "", "creation_timestamp": "2025-01-15T19:41:49.464619Z"}, {"uuid": "2ec019e1-ac30-4785-a64e-d1ada9bbdb16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40771", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfslfyszlw2f", "content": "", "creation_timestamp": "2025-01-15T20:15:49.769018Z"}, {"uuid": "ca2985fc-99f4-4e51-908f-c269698c0972", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40771", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113834243164740590", "content": "", "creation_timestamp": "2025-01-15T20:25:05.159458Z"}, {"uuid": "8bd710c5-9373-4487-8011-2abe644ff7e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40771", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1841", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-40771\n\ud83d\udd39 Description: The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14.5, iOS 16.7.8 and iPadOS 16.7.8, iOS 17.5 and iPadOS 17.5, macOS Monterey 12.7.5, watchOS 10.5, tvOS 17.5, macOS Ventura 13.6.7, visionOS 1.2. An app may be able to execute arbitrary code with kernel privileges.\n\ud83d\udccf Published: 2025-01-15T19:35:58.395Z\n\ud83d\udccf Modified: 2025-01-15T19:35:58.395Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/120900\n2. https://support.apple.com/en-us/120901\n3. https://support.apple.com/en-us/120906\n4. https://support.apple.com/en-us/120898\n5. https://support.apple.com/en-us/120905\n6. https://support.apple.com/en-us/120899\n7. https://support.apple.com/en-us/120902\n8. https://support.apple.com/en-us/120903", "creation_timestamp": "2025-01-15T19:55:09.000000Z"}, {"uuid": "3a34e1ed-a672-4e96-80dc-4827dc39a1b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40771", "type": "seen", "source": "https://t.me/cvedetector/15521", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40771 - Apple Kernel Arbitrary Code Execution\", \n  \"Content\": \"CVE ID : CVE-2024-40771 \nPublished : Jan. 15, 2025, 8:15 p.m. | 25\u00a0minutes ago \nDescription : The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14.5, iOS 16.7.8 and iPadOS 16.7.8, iOS 17.5 and iPadOS 17.5, macOS Monterey 12.7.5, watchOS 10.5, tvOS 17.5, macOS Ventura 13.6.7, visionOS 1.2. An app may be able to execute arbitrary code with kernel privileges. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-15T21:49:40.000000Z"}]}