CVE-2024-27820

8.8 HIGH

📋 TL;DR

This memory handling vulnerability in Apple's WebKit browser engine allows processing malicious web content to execute arbitrary code on affected devices. It affects users of Apple's operating systems and Safari browser who visit compromised or malicious websites. Successful exploitation could give attackers full control of the device.

💻 Affected Systems

Products:
  • Safari
  • tvOS
  • iOS
  • iPadOS
  • visionOS
  • watchOS
  • macOS
Versions: Versions prior to tvOS 17.5, iOS 16.7.8, iPadOS 16.7.8, visionOS 1.2, Safari 17.5, iOS 17.5, iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5
Operating Systems: iOS, iPadOS, macOS, tvOS, watchOS, visionOS
Default Config Vulnerable: ⚠️ Yes
Notes: All devices using WebKit browser engine are affected. No special configuration required for exploitation.

📦 What is this software?

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attackers to install malware, steal sensitive data, and maintain persistent access.

🟠

Likely Case

Drive-by compromise when users visit malicious websites, leading to data theft or ransomware deployment.

🟢

If Mitigated

Limited impact if devices are fully patched and web content filtering is implemented.

🌐 Internet-Facing: HIGH - Exploitation requires only visiting a malicious website, making internet-facing devices highly vulnerable.
🏢 Internal Only: MEDIUM - Internal users could be targeted via phishing or compromised internal websites.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only visiting malicious web content. No authentication or user interaction beyond browsing required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: tvOS 17.5, iOS 16.7.8, iPadOS 16.7.8, visionOS 1.2, Safari 17.5, iOS 17.5, iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5

Vendor Advisory: https://support.apple.com/en-us/HT214100

Restart Required: Yes

Instructions:

1. Open Settings app. 2. Go to General > Software Update. 3. Install available updates. 4. Restart device when prompted.

🔧 Temporary Workarounds

Disable JavaScript

all

Temporarily disable JavaScript in Safari to prevent exploitation via web content.

Safari > Settings > Security > Uncheck 'Enable JavaScript'

Use Alternative Browser

all

Use browsers not based on WebKit engine until patches are applied.

🧯 If You Can't Patch

  • Implement web content filtering to block malicious websites
  • Restrict browsing to trusted websites only

🔍 How to Verify

Check if Vulnerable:

Check device version in Settings > General > About > Software Version

Check Version:

Settings > General > About > Software Version (iOS/iPadOS) or About This Mac > Software Update (macOS)

Verify Fix Applied:

Verify version matches or exceeds patched versions listed in affected_systems.versions

📡 Detection & Monitoring

Log Indicators:

  • Unexpected Safari/WebKit crashes
  • Unusual process spawning from Safari
  • Memory access violations in system logs

Network Indicators:

  • Connections to known malicious domains from Safari
  • Unusual outbound traffic patterns

SIEM Query:

source="*safari*" OR process="Safari" AND (event="crash" OR event="memory_violation")

🔗 References

📤 Share & Export