CVE-2023-38595
📋 TL;DR
This vulnerability allows arbitrary code execution when processing malicious web content. It affects Apple devices running vulnerable versions of iOS, iPadOS, tvOS, macOS, Safari, and watchOS. Attackers can exploit this to run arbitrary code on affected systems.
💻 Affected Systems
- iOS
- iPadOS
- tvOS
- macOS Ventura
- Safari
- watchOS
📦 What is this software?
Ipados by Apple
Macos by Apple
macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...
Learn more about Macos →Safari by Apple
Tvos by Apple
Watchos by Apple
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise allowing attacker to execute arbitrary code with system privileges, potentially leading to data theft, ransomware deployment, or persistent backdoor installation.
Likely Case
Drive-by web attacks where visiting a malicious website leads to code execution, potentially stealing credentials, session cookies, or installing malware.
If Mitigated
With proper web filtering, least privilege, and updated systems, impact is limited to isolated browser processes with minimal system access.
🎯 Exploit Status
Exploitation requires user to visit malicious website or view malicious web content. No authentication required for the web content processing component.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: iOS 16.6, iPadOS 16.6, tvOS 16.6, macOS Ventura 13.5, Safari 16.6, watchOS 9.6
Vendor Advisory: https://support.apple.com/en-us/HT213841
Restart Required: Yes
Instructions:
1. Open Settings app. 2. Go to General > Software Update. 3. Download and install the latest update. 4. Restart device when prompted.
🔧 Temporary Workarounds
Disable JavaScript
allDisable JavaScript in Safari settings to prevent web content processing vulnerabilities
Use Alternative Browser
allUse third-party browsers that may not be affected by Safari-specific vulnerabilities
🧯 If You Can't Patch
- Implement strict web filtering to block malicious websites
- Use application whitelisting to prevent unauthorized code execution
🔍 How to Verify
Check if Vulnerable:
Check device version in Settings > General > About > Software Version
Check Version:
On macOS: sw_vers; On iOS/iPadOS: Check Settings > General > About
Verify Fix Applied:
Verify version is iOS 16.6+, iPadOS 16.6+, tvOS 16.6+, macOS Ventura 13.5+, Safari 16.6+, or watchOS 9.6+
📡 Detection & Monitoring
Log Indicators:
- Unusual Safari/WebKit process crashes
- Suspicious web content processing errors
- Unexpected code execution from web processes
Network Indicators:
- Connections to known malicious domains from Safari/WebKit processes
- Unusual outbound traffic patterns after web browsing
SIEM Query:
process_name:Safari AND (event_type:crash OR event_type:execution) AND NOT user_action:expected
🔗 References
- http://www.openwall.com/lists/oss-security/2023/08/02/1
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJ4DG5LHWG2INDOTPB7MO4JVJN6LKL3M/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQXJYKTGLKI6TJEFJCKPHCNY7PS72OER/
- https://security.gentoo.org/glsa/202401-04
- https://support.apple.com/en-us/HT213841
- https://support.apple.com/en-us/HT213843
- https://support.apple.com/en-us/HT213846
- https://support.apple.com/en-us/HT213847
- https://support.apple.com/en-us/HT213848
- https://www.debian.org/security/2023/dsa-5468
- http://www.openwall.com/lists/oss-security/2023/08/02/1
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJ4DG5LHWG2INDOTPB7MO4JVJN6LKL3M/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQXJYKTGLKI6TJEFJCKPHCNY7PS72OER/
- https://security.gentoo.org/glsa/202401-04
- https://support.apple.com/en-us/HT213841
- https://support.apple.com/en-us/HT213843
- https://support.apple.com/en-us/HT213846
- https://support.apple.com/en-us/HT213847
- https://support.apple.com/en-us/HT213848
- https://www.debian.org/security/2023/dsa-5468