CVE-2024-23222
📋 TL;DR
A type confusion vulnerability in Apple's WebKit browser engine allows processing malicious web content to execute arbitrary code. This affects users of iOS, iPadOS, macOS, and tvOS who visit compromised websites. Apple has confirmed this vulnerability may have been actively exploited.
💻 Affected Systems
- iOS
- iPadOS
- macOS
- tvOS
📦 What is this software?
Ipados by Apple
Ipados by Apple
Macos by Apple
macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...
Learn more about Macos →Macos by Apple
macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...
Learn more about Macos →Macos by Apple
macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...
Learn more about Macos →Tvos by Apple
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with attacker gaining complete control over the device, enabling data theft, surveillance, or ransomware deployment.
Likely Case
Drive-by compromise where visiting a malicious website leads to malware installation, credential theft, or device takeover.
If Mitigated
Limited impact with proper network filtering, application sandboxing, and user awareness preventing successful exploitation.
🎯 Exploit Status
Apple confirms active exploitation in the wild. Exploitation requires only visiting a malicious website.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: iOS 17.3, iPadOS 17.3, macOS Sonoma 14.3, tvOS 17.3
Vendor Advisory: https://support.apple.com/en-us/HT214055
Restart Required: Yes
Instructions:
1. Open Settings app. 2. Go to General > Software Update. 3. Download and install the latest update. 4. Restart device when prompted.
🔧 Temporary Workarounds
Disable JavaScript
allTemporarily disable JavaScript in Safari to prevent exploitation through web content.
Use Alternative Browser
allSwitch to browsers not based on WebKit (e.g., Firefox on macOS) until patched.
🧯 If You Can't Patch
- Implement network filtering to block known malicious domains and restrict web browsing to trusted sites only.
- Enable application sandboxing and least privilege access controls to limit potential damage from exploitation.
🔍 How to Verify
Check if Vulnerable:
Check device version in Settings > General > About > Software Version.
Check Version:
On macOS: sw_vers -productVersion. On iOS/iPadOS/tvOS: Check in Settings > General > About.
Verify Fix Applied:
Confirm Software Version shows iOS 17.3+, iPadOS 17.3+, macOS Sonoma 14.3+, or tvOS 17.3+.
📡 Detection & Monitoring
Log Indicators:
- Unusual Safari/WebKit process crashes
- Suspicious network connections from browser processes
- Unexpected privilege escalation
Network Indicators:
- Connections to known exploit domains
- Unusual outbound traffic patterns from affected devices
SIEM Query:
source="apple_system_logs" AND (process="Safari" OR process="WebKit") AND (event="crash" OR event="privilege_escalation")
🔗 References
- https://support.apple.com/en-us/HT214055
- https://support.apple.com/en-us/HT214059
- https://support.apple.com/en-us/HT214061
- https://support.apple.com/kb/HT214055
- https://support.apple.com/kb/HT214056
- https://support.apple.com/kb/HT214057
- https://support.apple.com/kb/HT214058
- https://support.apple.com/kb/HT214059
- https://support.apple.com/kb/HT214061
- https://support.apple.com/kb/HT214063
- http://seclists.org/fulldisclosure/2024/Feb/6
- http://seclists.org/fulldisclosure/2024/Jan/34
- http://seclists.org/fulldisclosure/2024/Jan/40
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/US43EQFC2IS66EA2CPAZFH2RQ6WD7PKF/
- https://support.apple.com/en-us/HT214055
- https://support.apple.com/en-us/HT214059
- https://support.apple.com/en-us/HT214061
- https://support.apple.com/kb/HT214055
- https://support.apple.com/kb/HT214056
- https://support.apple.com/kb/HT214057
- https://support.apple.com/kb/HT214058
- https://support.apple.com/kb/HT214059
- https://support.apple.com/kb/HT214061
- https://support.apple.com/kb/HT214063
- https://support.apple.com/kb/HT214070
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-23222