CVE-2024-54478

6.5 MEDIUM

📋 TL;DR

This CVE describes an out-of-bounds memory access vulnerability in Apple's web content processing components. Attackers can cause unexpected process crashes by tricking users into visiting malicious websites. Affects users of Apple devices running vulnerable versions of iOS, iPadOS, macOS, tvOS, watchOS, and visionOS.

💻 Affected Systems

Products:
  • Safari
  • WebKit-based applications
  • Apple operating systems
Versions: Versions prior to iPadOS 17.7.4, visionOS 2.2, tvOS 18.2, watchOS 11.2, iOS 18.2, iPadOS 18.2, macOS Sonoma 14.7.2, macOS Sequoia 15.2
Operating Systems: iOS, iPadOS, macOS, tvOS, watchOS, visionOS
Default Config Vulnerable: ⚠️ Yes
Notes: All devices using WebKit for web content rendering are affected by default.

📦 What is this software?

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Potential arbitrary code execution leading to full device compromise if combined with other vulnerabilities, though Apple's sandboxing would limit impact.

🟠

Likely Case

Denial of service through application or browser crashes when processing malicious web content.

🟢

If Mitigated

Minimal impact with proper patching and security controls in place.

🌐 Internet-Facing: HIGH - Exploitation requires only visiting a malicious website, making internet-facing devices particularly vulnerable.
🏢 Internal Only: MEDIUM - Internal users could be targeted via phishing or compromised internal websites.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction (visiting malicious website) but no authentication. Apple has patched this vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: iPadOS 17.7.4, visionOS 2.2, tvOS 18.2, watchOS 11.2, iOS 18.2 and iPadOS 18.2, macOS Sonoma 14.7.2, macOS Sequoia 15.2

Vendor Advisory: https://support.apple.com/en-us/121837

Restart Required: Yes

Instructions:

1. Go to Settings > General > Software Update on iOS/iPadOS/watchOS. 2. Go to System Settings > General > Software Update on macOS. 3. Install the latest available update. 4. Restart device after installation.

🔧 Temporary Workarounds

Disable JavaScript

all

Temporarily disable JavaScript in Safari to prevent exploitation via web content.

Use Alternative Browser

all

Use browsers not based on WebKit until patches are applied.

🧯 If You Can't Patch

  • Implement web content filtering to block malicious sites
  • Restrict browsing to trusted websites only

🔍 How to Verify

Check if Vulnerable:

Check current OS version against patched versions listed in Apple advisories.

Check Version:

iOS/iPadOS: Settings > General > About > Version. macOS: Apple menu > About This Mac > macOS version.

Verify Fix Applied:

Verify OS version matches or exceeds patched versions: iOS/iPadOS 18.2+, macOS Sequoia 15.2+, etc.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected Safari/WebKit process crashes
  • Memory access violation logs

Network Indicators:

  • Connections to suspicious domains followed by browser crashes

SIEM Query:

source="apple_system_logs" AND (process="Safari" OR process="WebKit") AND event="crash"

🔗 References

📤 Share & Export