CVE-2023-38597
📋 TL;DR
This is a memory corruption vulnerability in Apple's WebKit browser engine that allows arbitrary code execution when processing malicious web content. Attackers can exploit this by tricking users into visiting specially crafted websites, potentially taking full control of affected devices. The vulnerability affects iOS, iPadOS, macOS, and Safari users running vulnerable versions.
💻 Affected Systems
- iOS
- iPadOS
- macOS
- Safari
📦 What is this software?
Ipados by Apple
Ipados by Apple
Macos by Apple
macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...
Learn more about Macos →Safari by Apple
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise allowing attackers to execute arbitrary code with user privileges, install malware, steal sensitive data, and maintain persistence on the device.
Likely Case
Attackers create malicious websites that exploit this vulnerability when visited, leading to drive-by downloads, credential theft, or device takeover.
If Mitigated
With proper patching, the vulnerability is eliminated. With network filtering and user education, risk is significantly reduced but not eliminated.
🎯 Exploit Status
Exploitation requires user interaction (visiting a malicious website) but no authentication. The CVSS score of 8.8 suggests relatively straightforward exploitation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: iOS 15.7.8, iPadOS 15.7.8, iOS 16.6, iPadOS 16.6, macOS Ventura 13.5, Safari 16.6
Vendor Advisory: https://support.apple.com/en-us/HT213841
Restart Required: Yes
Instructions:
1. Open Settings app. 2. Go to General > Software Update. 3. Download and install the latest available update. 4. Restart device when prompted. For macOS: 1. Open System Settings. 2. Go to General > Software Update. 3. Install available updates. 4. Restart computer.
🔧 Temporary Workarounds
Disable JavaScript
allDisabling JavaScript in Safari prevents exploitation of this WebKit vulnerability but breaks most modern websites.
Safari: Safari > Settings > Security > uncheck 'Enable JavaScript'
Use Alternative Browser
allUse browsers not based on WebKit (Chrome, Firefox) until devices can be patched.
🧯 If You Can't Patch
- Implement web filtering to block known malicious sites and restrict access to untrusted websites
- Enable application whitelisting to prevent execution of unauthorized code
🔍 How to Verify
Check if Vulnerable:
Check current OS version against affected versions. iOS/iPadOS: Settings > General > About > Version. macOS: Apple menu > About This Mac > macOS version. Safari: Safari > About Safari.
Check Version:
iOS/iPadOS: Settings > General > About > Version. macOS: sw_vers. Safari: defaults read /Applications/Safari.app/Contents/Info.plist CFBundleShortVersionString
Verify Fix Applied:
Verify OS version is at or above: iOS 15.7.8, iPadOS 15.7.8, iOS 16.6, iPadOS 16.6, macOS Ventura 13.5, Safari 16.6
📡 Detection & Monitoring
Log Indicators:
- Safari/WebKit crash logs with memory corruption indicators
- Unexpected process creation from Safari/WebKit processes
- Network connections to suspicious domains followed by unusual process activity
Network Indicators:
- HTTP requests to domains hosting exploit code
- Unusual outbound connections from Safari processes
SIEM Query:
process_name:Safari AND (event_type:process_creation OR event_type:crash) AND (parent_process:launchd OR parent_process:Dock)
🔗 References
- http://www.openwall.com/lists/oss-security/2023/08/02/1
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJ4DG5LHWG2INDOTPB7MO4JVJN6LKL3M/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQXJYKTGLKI6TJEFJCKPHCNY7PS72OER/
- https://security.gentoo.org/glsa/202401-04
- https://support.apple.com/en-us/HT213841
- https://support.apple.com/en-us/HT213842
- https://support.apple.com/en-us/HT213843
- https://support.apple.com/en-us/HT213847
- https://www.debian.org/security/2023/dsa-5468
- http://www.openwall.com/lists/oss-security/2023/08/02/1
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJ4DG5LHWG2INDOTPB7MO4JVJN6LKL3M/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQXJYKTGLKI6TJEFJCKPHCNY7PS72OER/
- https://security.gentoo.org/glsa/202401-04
- https://support.apple.com/en-us/HT213841
- https://support.apple.com/en-us/HT213842
- https://support.apple.com/en-us/HT213843
- https://support.apple.com/en-us/HT213847
- https://www.debian.org/security/2023/dsa-5468