CVE-2023-38572

7.5 HIGH

📋 TL;DR

This vulnerability allows malicious websites to bypass the Same Origin Policy in Apple's WebKit browser engine, potentially enabling cross-site data theft or session hijacking. It affects users of Apple devices and software running vulnerable versions of Safari/WebKit. The issue was addressed through improved security checks in Apple's updates.

💻 Affected Systems

Products:
  • iOS
  • iPadOS
  • tvOS
  • macOS
  • Safari
  • watchOS
Versions: Versions before iOS 15.7.8, iPadOS 15.7.8, iOS 16.6, iPadOS 16.6, tvOS 16.6, macOS Ventura 13.5, Safari 16.6, watchOS 9.6
Operating Systems: iOS, iPadOS, macOS, tvOS, watchOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected Apple products are vulnerable. The vulnerability resides in WebKit, which powers Safari and other Apple web views.

📦 What is this software?

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of user sessions, theft of sensitive data from other websites, and execution of unauthorized actions in the context of authenticated users.

🟠

Likely Case

Targeted attacks stealing authentication tokens, session cookies, or sensitive information from other websites the user has open.

🟢

If Mitigated

Limited impact with proper web application security headers and user awareness, though fundamental browser security is compromised.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction (visiting a malicious website) but no authentication. Technical details are limited in public disclosures.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: iOS 15.7.8, iPadOS 15.7.8, iOS 16.6, iPadOS 16.6, tvOS 16.6, macOS Ventura 13.5, Safari 16.6, watchOS 9.6

Vendor Advisory: https://support.apple.com/en-us/HT213841

Restart Required: Yes

Instructions:

1. On Apple devices, go to Settings > General > Software Update. 2. Download and install the latest available update. 3. Restart the device when prompted. 4. For macOS, go to System Settings > General > Software Update. 5. For Safari on older macOS versions, update through the App Store.

🔧 Temporary Workarounds

Use alternative browser

all

Temporarily use browsers not based on WebKit (like Firefox or Chrome on macOS) until patches are applied.

Disable JavaScript

all

Disable JavaScript in Safari settings to prevent exploitation, though this breaks most website functionality.

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers on web applications to limit impact
  • Use browser isolation solutions or virtual browsing environments for high-risk users

🔍 How to Verify

Check if Vulnerable:

Check the device/software version against the patched versions listed in the Apple advisory.

Check Version:

On Apple devices: Settings > General > About > Version. On macOS: Apple menu > About This Mac > macOS version. In Safari: Safari menu > About Safari.

Verify Fix Applied:

Confirm the device/software is running at least the minimum patched version specified by Apple.

📡 Detection & Monitoring

Log Indicators:

  • Unusual cross-origin requests in web server logs
  • Suspicious iframe or script loading patterns

Network Indicators:

  • Unexpected cross-domain requests from user browsers
  • Traffic patterns suggesting session hijacking

SIEM Query:

source="web_server" AND (uri CONTAINS "cross-origin" OR referer_domain != host_domain) AND status=200

🔗 References

📤 Share & Export