CVE-2024-44309

6.1 MEDIUM

📋 TL;DR

This vulnerability in Apple's Safari browser and related operating systems allows cross-site scripting (XSS) attacks due to improper cookie management. Attackers can craft malicious web content that, when processed by vulnerable systems, enables execution of arbitrary scripts in the context of the victim's browser session. Users of affected Apple devices and browsers are at risk.

💻 Affected Systems

Products:
  • Safari
  • iOS
  • iPadOS
  • macOS
  • visionOS
Versions: Versions prior to Safari 18.1.1, iOS 17.7.2, iPadOS 17.7.2, macOS Sequoia 15.1.1, iOS 18.1.1, iPadOS 18.1.1, visionOS 2.1.1
Operating Systems: iOS, iPadOS, macOS, visionOS
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically mentioned as actively exploited on Intel-based Mac systems. All default configurations of affected versions are vulnerable.

📦 What is this software?

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete account takeover, session hijacking, credential theft, and unauthorized actions performed on behalf of the victim user across web applications.

🟠

Likely Case

Session hijacking, theft of authentication cookies, and execution of malicious scripts in the victim's browser context leading to data exfiltration.

🟢

If Mitigated

Limited impact due to Content Security Policy (CSP) headers, same-origin policy enforcement, and modern browser security features reducing script execution scope.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Apple confirms active exploitation in the wild. Exploitation requires user interaction with malicious web content but no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Safari 18.1.1, iOS 17.7.2, iPadOS 17.7.2, macOS Sequoia 15.1.1, iOS 18.1.1, iPadOS 18.1.1, visionOS 2.1.1

Vendor Advisory: https://support.apple.com/en-us/121752

Restart Required: Yes

Instructions:

1. Open Settings/System Preferences. 2. Navigate to Software Update. 3. Install available updates for your operating system. 4. Restart device when prompted.

🔧 Temporary Workarounds

Disable JavaScript

macos

Temporarily disable JavaScript execution in Safari to prevent XSS payloads from running.

Safari > Settings > Security > Uncheck 'Enable JavaScript'

Use Alternative Browser

all

Switch to a non-affected browser until patches are applied.

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers on web applications to restrict script execution
  • Use web application firewalls (WAF) with XSS protection rules and monitor for suspicious cookie manipulation

🔍 How to Verify

Check if Vulnerable:

Check Safari version via Safari > About Safari. Check OS version via Settings > General > About on iOS/iPadOS or Apple menu > About This Mac on macOS.

Check Version:

macOS: sw_vers -productVersion; iOS/iPadOS: Settings > General > About > Version; Safari: Safari > About Safari

Verify Fix Applied:

Confirm version numbers match or exceed patched versions: Safari 18.1.1+, iOS 17.7.2+, iPadOS 17.7.2+, macOS Sequoia 15.1.1+, iOS 18.1.1+, iPadOS 18.1.1+, visionOS 2.1.1+

📡 Detection & Monitoring

Log Indicators:

  • Unusual cookie manipulation patterns
  • Multiple failed authentication attempts from same session
  • Suspicious script execution in browser logs

Network Indicators:

  • Unexpected outbound connections following web page visits
  • Anomalous cookie headers in HTTP traffic

SIEM Query:

source="web_proxy" AND (cookie:*script* OR cookie:*alert* OR cookie:*javascript*)

🔗 References

📤 Share & Export