CVE-2024-44192

5.5 MEDIUM

📋 TL;DR

This vulnerability allows malicious web content to cause unexpected process crashes in Apple's WebKit browser engine. It affects users of Safari and Apple operating systems with vulnerable versions. The issue is a denial-of-service vulnerability that can crash the browser or application processing the malicious content.

💻 Affected Systems

Products:
  • Safari
  • watchOS
  • macOS
  • visionOS
  • iOS
  • iPadOS
  • tvOS
Versions: Versions prior to watchOS 11, macOS Sequoia 15, Safari 18, visionOS 2, iOS 18, iPadOS 18, tvOS 18
Operating Systems: macOS, iOS, iPadOS, watchOS, tvOS, visionOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected Apple operating systems and Safari browser are vulnerable.

📦 What is this software?

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete browser/application crash leading to denial of service, potential loss of unsaved work, and disruption of user activities.

🟠

Likely Case

Temporary browser crash when visiting malicious websites, requiring restart of the affected application.

🟢

If Mitigated

No impact if patched versions are installed; crashes are contained to the affected process without system-wide effects.

🌐 Internet-Facing: HIGH - Exploitation requires visiting malicious websites, which is common for internet-facing systems.
🏢 Internal Only: MEDIUM - Internal users could be targeted via phishing or compromised internal websites.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction (visiting malicious website) but no authentication. No public exploit code has been disclosed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: watchOS 11, macOS Sequoia 15, Safari 18, visionOS 2, iOS 18, iPadOS 18, tvOS 18

Vendor Advisory: https://support.apple.com/en-us/121238

Restart Required: Yes

Instructions:

1. Open System Settings/Preferences. 2. Go to Software Update. 3. Install available updates for your operating system. 4. For Safari on macOS, update through App Store or System Preferences. 5. Restart device after installation.

🔧 Temporary Workarounds

Disable JavaScript

all

Prevents execution of malicious JavaScript that could trigger the vulnerability

Safari: Safari > Settings > Security > uncheck 'Enable JavaScript'

Use Content Blockers

all

Block known malicious websites and scripts

Install reputable content blocker extensions from App Store

🧯 If You Can't Patch

  • Implement web filtering to block known malicious domains
  • Educate users to avoid suspicious websites and links

🔍 How to Verify

Check if Vulnerable:

Check current OS/browser version against vulnerable versions list

Check Version:

macOS: sw_vers -productVersion; iOS/iPadOS: Settings > General > About > Version; Safari: Safari > About Safari

Verify Fix Applied:

Verify OS/browser version matches or exceeds patched versions

📡 Detection & Monitoring

Log Indicators:

  • Unexpected Safari/WebKit process crashes
  • Browser crash reports in Console.app

Network Indicators:

  • Connections to suspicious domains followed by browser crashes

SIEM Query:

source="apple_system_logs" AND (process="Safari" OR process="WebKit") AND event="crash"

🔗 References

📤 Share & Export