Logitech Options+ on MacOS prior 1.72 allows a local attacker to inject dynamic library within Options+ runtime and abuse permissions granted by the user to Options+ such as Camera.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.hackerone.com |
History
Wed, 11 Sep 2024 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Logitech
Logitech options\+ |
|
CPEs | cpe:2.3:a:logitech:options\+:*:*:*:*:*:macos:*:* | |
Vendors & Products |
Logitech
Logitech options\+ |
|
Metrics |
cvssV3_1
|
Mon, 26 Aug 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sun, 25 Aug 2024 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Logitech Options+ on MacOS prior 1.72 allows a local attacker to inject dynamic library within Options+ runtime and abuse permissions granted by the user to Options+ such as Camera. | |
Weaknesses | CWE-863 | |
References |
| |
Metrics |
cvssV4_0
|
MITRE
Status: PUBLISHED
Assigner: Logitech
Published: 2024-08-25T11:44:45.839Z
Updated: 2024-08-26T15:28:33.495Z
Reserved: 2024-08-20T14:15:07.515Z
Link: CVE-2024-8011
Vulnrichment
Updated: 2024-08-26T15:28:29.644Z
NVD
Status : Analyzed
Published: 2024-08-25T12:15:03.940
Modified: 2024-09-11T18:15:02.023
Link: CVE-2024-8011
Redhat
No data.