CVE-2024-27808

8.8 HIGH

📋 TL;DR

This memory handling vulnerability in Apple's WebKit browser engine allows processing malicious web content to execute arbitrary code on affected devices. It affects users of Apple's operating systems and Safari browser before the patched versions. Successful exploitation could lead to complete system compromise.

💻 Affected Systems

Products:
  • tvOS
  • visionOS
  • Safari
  • iOS
  • iPadOS
  • watchOS
  • macOS Sonoma
Versions: Versions before tvOS 17.5, visionOS 1.2, Safari 17.5, iOS 17.5, iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5
Operating Systems: iOS, iPadOS, macOS, tvOS, watchOS, visionOS
Default Config Vulnerable: ⚠️ Yes
Notes: All devices using WebKit browser engine are affected when processing web content.

📦 What is this software?

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote attacker gains full control of device through malicious web content, enabling data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Drive-by download attacks where visiting a compromised website leads to malware installation or credential theft.

🟢

If Mitigated

Limited impact with proper network segmentation, web filtering, and least privilege controls preventing lateral movement.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction (visiting malicious website) but no authentication. Memory corruption vulnerabilities in WebKit are frequently exploited in the wild.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: tvOS 17.5, visionOS 1.2, Safari 17.5, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5

Vendor Advisory: https://support.apple.com/en-us/HT214101

Restart Required: Yes

Instructions:

1. Open Settings app. 2. Navigate to General > Software Update. 3. Download and install available updates. 4. Restart device when prompted.

🔧 Temporary Workarounds

Disable JavaScript

all

Temporarily disable JavaScript in Safari to prevent exploitation through web content.

Safari > Settings > Security > uncheck 'Enable JavaScript'

Use Alternative Browser

all

Use browsers not based on WebKit engine until patches are applied.

🧯 If You Can't Patch

  • Implement strict web content filtering to block malicious sites
  • Segment affected devices from critical network resources

🔍 How to Verify

Check if Vulnerable:

Check current OS version against affected versions list.

Check Version:

macOS: sw_vers -productVersion, iOS/iPadOS: Settings > General > About > Version

Verify Fix Applied:

Verify OS version matches or exceeds patched versions listed in fix_official.patch_version.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected Safari/WebKit process crashes
  • Memory access violation logs
  • Unusual network connections from browser processes

Network Indicators:

  • Outbound connections to known malicious domains after web browsing
  • Unusual download patterns from web processes

SIEM Query:

process_name:"Safari" OR process_name:"WebKit" AND (event_type:crash OR memory_violation)

🔗 References

📤 Share & Export