CVE-2024-44296

5.4 MEDIUM

📋 TL;DR

This vulnerability allows malicious web content to bypass Content Security Policy (CSP) enforcement in Apple's WebKit browser engine. It affects users of Apple devices and software that use WebKit for web content rendering. Successful exploitation could allow attackers to execute scripts that would normally be blocked by CSP.

💻 Affected Systems

Products:
  • tvOS
  • iOS
  • iPadOS
  • watchOS
  • visionOS
  • macOS Sequoia
  • Safari
Versions: Versions before tvOS 18.1, iOS 18.1, iPadOS 18.1, iOS 17.7.1, iPadOS 17.7.1, watchOS 11.1, visionOS 2.1, macOS Sequoia 15.1, Safari 18.1
Operating Systems: Apple tvOS, Apple iOS, Apple iPadOS, Apple watchOS, Apple visionOS, Apple macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All devices using WebKit browser engine for web content processing are affected. This includes Safari browser and any apps using WebView components.

📦 What is this software?

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could bypass CSP protections to execute malicious JavaScript, potentially leading to cross-site scripting (XSS) attacks, session hijacking, or data theft from web applications that rely on CSP for security.

🟠

Likely Case

Malicious websites could bypass CSP restrictions to load unauthorized scripts or resources, potentially enabling clickjacking, ad injection, or limited XSS attacks against vulnerable web applications.

🟢

If Mitigated

With proper CSP configurations and defense-in-depth measures, the impact is limited to specific web applications that rely solely on CSP for script execution prevention.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires delivering malicious web content to vulnerable devices, typically through phishing or compromised websites. No public exploit code is currently known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: tvOS 18.1, iOS 18.1 and iPadOS 18.1, iOS 17.7.1 and iPadOS 17.7.1, watchOS 11.1, visionOS 2.1, macOS Sequoia 15.1, Safari 18.1

Vendor Advisory: https://support.apple.com/en-us/121563

Restart Required: Yes

Instructions:

1. Open Settings app. 2. Navigate to General > Software Update. 3. Download and install the latest available update for your device. 4. Restart device when prompted.

🔧 Temporary Workarounds

Disable JavaScript (temporary)

all

Temporarily disable JavaScript in Safari settings to prevent script execution while waiting for patch

Use alternative browser

all

Use browsers not based on WebKit (Chrome, Firefox) until devices are patched

🧯 If You Can't Patch

  • Implement additional web application security controls beyond CSP (WAF, input validation)
  • Restrict access to untrusted websites and implement network filtering

🔍 How to Verify

Check if Vulnerable:

Check device version in Settings > General > About > Software Version

Check Version:

Settings > General > About > Software Version (iOS/iPadOS/tvOS/watchOS/visionOS) or About This Mac > Software Update (macOS)

Verify Fix Applied:

Verify installed version matches or exceeds patched versions listed in affected_systems

📡 Detection & Monitoring

Log Indicators:

  • Unexpected CSP violation reports in web server logs
  • Increased script execution from unexpected sources

Network Indicators:

  • Unusual outbound connections from Apple devices to suspicious domains
  • Traffic patterns suggesting bypassed CSP policies

SIEM Query:

source="web_server" AND (csp_violation OR content_security_policy) AND severity=high

🔗 References

📤 Share & Export