CVE-2024-54505

8.8 HIGH

📋 TL;DR

This CVE describes a type confusion vulnerability in Apple's WebKit browser engine that could allow memory corruption when processing malicious web content. Attackers could exploit this to execute arbitrary code on affected devices. All users running vulnerable versions of Apple operating systems and Safari are affected.

💻 Affected Systems

Products:
  • Safari
  • WebKit
Versions: Versions prior to those listed in fix information
Operating Systems: iOS, iPadOS, macOS, watchOS, tvOS, visionOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected Apple operating systems and Safari are vulnerable.

📦 What is this software?

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Browser sandbox escape leading to arbitrary code execution within the browser context, potentially enabling further exploitation.

🟢

If Mitigated

Limited impact due to browser sandboxing, but still potentially serious if combined with other vulnerabilities.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction (visiting malicious website) but no authentication. Type confusion vulnerabilities often require specific memory manipulation knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: iPadOS 17.7.3, watchOS 11.2, visionOS 2.2, tvOS 18.2, macOS Sequoia 15.2, Safari 18.2, iOS 18.2, iPadOS 18.2

Vendor Advisory: https://support.apple.com/en-us/121837

Restart Required: Yes

Instructions:

1. Open Settings/System Preferences. 2. Navigate to Software Update. 3. Download and install the latest available update. 4. Restart the device when prompted.

🔧 Temporary Workarounds

Disable JavaScript

all

Temporarily disable JavaScript in Safari to prevent exploitation through web content.

Use Alternative Browser

all

Use a non-WebKit based browser until patches are applied.

🧯 If You Can't Patch

  • Implement network filtering to block malicious websites and restrict web browsing to trusted sites only.
  • Deploy application control to restrict execution of unauthorized code and enable enhanced browser sandboxing.

🔍 How to Verify

Check if Vulnerable:

Check current OS version against vulnerable versions listed in Apple advisories.

Check Version:

macOS: sw_vers -productVersion; iOS/iPadOS: Settings > General > About > Version; Safari: Safari > About Safari

Verify Fix Applied:

Verify OS/Safari version matches or exceeds patched versions listed in fix information.

📡 Detection & Monitoring

Log Indicators:

  • Crash reports from Safari/WebKit processes
  • Unexpected process creation from browser context

Network Indicators:

  • Connections to known malicious domains serving exploit code
  • Unusual outbound traffic from browser processes

SIEM Query:

process_name:Safari AND (event_type:crash OR parent_process:explorer.exe)

🔗 References

📤 Share & Export