CVE-2023-42917

8.8 HIGH

📋 TL;DR

This is a memory corruption vulnerability in Apple's WebKit browser engine that allows arbitrary code execution when processing malicious web content. It affects iOS, iPadOS, macOS, and Safari users running vulnerable versions. Apple has confirmed this vulnerability may have been actively exploited in the wild.

💻 Affected Systems

Products:
  • iOS
  • iPadOS
  • macOS
  • Safari
Versions: Versions before iOS 17.1.2, iPadOS 17.1.2, macOS Sonoma 14.1.2, Safari 17.1.2
Operating Systems: iOS, iPadOS, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. Apple specifically notes exploitation may have occurred against iOS versions before 16.7.1.

📦 What is this software?

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the device, enabling data theft, surveillance, or ransomware deployment.

🟠

Likely Case

Drive-by browser exploitation leading to malware installation, credential theft, or unauthorized access to sensitive data.

🟢

If Mitigated

Limited impact with proper network segmentation, application sandboxing, and user privilege restrictions in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Apple confirms this vulnerability may have been exploited in the wild. Exploitation requires only visiting a malicious website.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: iOS 17.1.2, iPadOS 17.1.2, macOS Sonoma 14.1.2, Safari 17.1.2

Vendor Advisory: https://support.apple.com/en-us/HT214058

Restart Required: Yes

Instructions:

1. Open Settings app. 2. Go to General > Software Update. 3. Install available updates. 4. Restart device when prompted.

🔧 Temporary Workarounds

Disable JavaScript

all

Temporarily disable JavaScript in Safari to prevent exploitation via web content.

Safari > Settings > Security > Uncheck 'Enable JavaScript'

Use Alternative Browser

all

Use browsers not based on WebKit engine until patched.

🧯 If You Can't Patch

  • Implement network filtering to block malicious websites and restrict web browsing to trusted sites only.
  • Enforce application sandboxing and least privilege access controls to limit potential damage from exploitation.

🔍 How to Verify

Check if Vulnerable:

Check device version in Settings > General > About > Software Version.

Check Version:

iOS/iPadOS: Settings > General > About > Software Version. macOS: Apple menu > About This Mac > Software Version. Safari: Safari > About Safari.

Verify Fix Applied:

Verify version is iOS 17.1.2 or later, iPadOS 17.1.2 or later, macOS Sonoma 14.1.2 or later, or Safari 17.1.2 or later.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected Safari/WebKit process crashes
  • Unusual network connections from browser processes
  • Suspicious file creation by browser processes

Network Indicators:

  • Connections to known malicious domains from Apple devices
  • Unusual outbound traffic patterns from browser sessions

SIEM Query:

source="apple_devices" AND (event="process_crash" AND process="Safari") OR (event="network_connection" AND dest_ip IN malicious_ips)

🔗 References

📤 Share & Export