About the security content of watchOS 10.5 – Apple Support

About the security content of watchOS 10.5 - Apple Support

October 15, 2024 at 02:21PM

Apple’s watchOS 10.5 addresses multiple security vulnerabilities, including memory handling, authentication issues, and input validation. These may allow local attackers to execute arbitrary code, access user data, or cause system shutdown. Updates are available for Apple Watch Series 4 and later to mitigate these risks. Release date: May 13, 2024.

### Meeting Takeaways

**Release Information:**
– **Product:** watchOS 10.5
– **Release Date:** May 13, 2024
– **Apple ID:** 120902

#### Security Vulnerabilities Addressed (CVE Identifiers):
1. **CVE-2024-27826**
– **Description:** Improved memory handling.
– **Impact:** Potential unexpected system shutdown by a local attacker.

2. **CVE-2024-27804**
– **Description:** Improved memory handling.
– **Impact:** Potential unexpected termination of an app.

3. **CVE-2024-27816**
– **Description:** Enhanced checks addressing a logic issue.
– **Impact:** Possible unauthorized access to user data.

4. **CVE-2024-27805**
– **Description:** Improved validation of environment variables.
– **Impact:** App may access sensitive user data.

5. **CVE-2024-27832**
– **Description:** Improved checks addressing a privilege escalation issue.
– **Impact:** App may elevate privileges.

6. **CVE-2024-27801**
– **Description:** Enhanced checks for privilege escalation.
– **Impact:** App may elevate privileges.

7. **CVE-2024-27828 / CVE-2024-27840 / CVE-2024-27815**
– **Description:** Improved input validation for out-of-bounds write issues.
– **Impact:** App may execute arbitrary code with kernel privileges.

8. **CVE-2024-27823**
– **Description:** Improved locking addressing a race condition.
– **Impact:** Possible spoofing of network packets by an attacker in a privileged network.

9. **CVE-2024-27811 / CVE-2024-23251**
– **Description:** Addressed authentication issues with improved state management.
– **Impact:** Potential leaking of Mail account credentials by an attacker with physical access.

10. **CVE-2024-23282**
– **Description:** Enhanced checks against unauthorized FaceTime calls.
– **Impact:** Malicious email triggering FaceTime calls without user consent.

11. **CVE-2024-27810**
– **Description:** Improved validation of path handling.
– **Impact:** App may read sensitive location information.

12. **CVE-2024-27800**
– **Description:** Removal of vulnerable code.
– **Impact:** Denial-of-service due to maliciously crafted messages.

13. **CVE-2024-27814**
– **Description:** Improved state management.
– **Impact:** Viewing contact information from the lock screen by someone with physical access.

14. **CVE-2024-27821**
– **Description:** Improved validation of path handling.
– **Impact:** Shortcuts may output sensitive user data without consent.

15. **CVE-2024-27806**
– **Description:** Improved environment sanitization.
– **Impact:** App may access sensitive user data.

16. **CVE-2024-27884, CVE-2024-27834, CVE-2024-27838, CVE-2024-27808, CVE-2024-27851**
– **Description:** Improved bounds checks.
– **Impact:** Processing malicious web content may lead to arbitrary code execution.

17. **CVE-2024-27830**
– **Description:** Improved state management.
– **Impact:** Malicious webpages may be able to fingerprint users.

18. **CVE-2024-27820**
– **Description:** Improved memory handling.
– **Impact:** Processing web content may lead to arbitrary code execution.

**Update Availability:**
– All updates are available for **Apple Watch Series 4 and later.**

The above vulnerabilities require attention, especially those that may impact user data and system stability. Please ensure timely updates and notifications to users regarding these issues.

Full Article