CVE-2024-54534

9.8 CRITICAL

📋 TL;DR

This is a critical memory corruption vulnerability in Apple's WebKit browser engine that affects multiple Apple operating systems and Safari. Processing malicious web content could allow attackers to execute arbitrary code on affected devices. All users of unpatched Apple devices with web browsing capabilities are at risk.

💻 Affected Systems

Products:
  • Safari
  • WebKit-based applications
Versions: Versions prior to watchOS 11.2, visionOS 2.2, tvOS 18.2, macOS Sequoia 15.2, Safari 18.2, iOS 18.2, iPadOS 18.2
Operating Systems: watchOS, visionOS, tvOS, macOS, iOS, iPadOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations with web browsing enabled are vulnerable. The vulnerability is in WebKit, which powers Safari and other Apple web views.

📦 What is this software?

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, and persistent malware installation.

🟠

Likely Case

Browser-based attacks delivering malware, credential theft, or ransomware through malicious websites.

🟢

If Mitigated

Limited impact with proper network segmentation, application whitelisting, and security controls in place.

🌐 Internet-Facing: HIGH - Exploitable through web browsing, which is inherently internet-facing.
🏢 Internal Only: MEDIUM - Could be exploited via internal malicious sites or phishing campaigns.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CVSS 9.8 indicates trivial exploitation requiring no user interaction beyond visiting a malicious website. No public exploit code is known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: watchOS 11.2, visionOS 2.2, tvOS 18.2, macOS Sequoia 15.2, Safari 18.2, iOS 18.2, iPadOS 18.2

Vendor Advisory: https://support.apple.com/en-us/121837

Restart Required: Yes

Instructions:

1. Go to Settings > General > Software Update on iOS/iPadOS/watchOS/tvOS/visionOS. 2. Install available updates. 3. For macOS, go to System Settings > General > Software Update. 4. For Safari on older macOS versions, update through App Store.

🔧 Temporary Workarounds

Disable JavaScript

all

Temporarily disable JavaScript in Safari to prevent exploitation through malicious web content.

Use Alternative Browser

all

Use non-WebKit browsers like Firefox or Chrome until patches are applied.

🧯 If You Can't Patch

  • Implement network filtering to block access to untrusted websites
  • Enable application control to restrict execution of unauthorized binaries

🔍 How to Verify

Check if Vulnerable:

Check system version against affected versions list. If running older than patched versions, system is vulnerable.

Check Version:

iOS/iPadOS: Settings > General > About > Version. macOS: Apple menu > About This Mac > macOS version. Safari: Safari menu > About Safari.

Verify Fix Applied:

Verify system version matches or exceeds patched versions listed in fix_official.patch_version.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected browser crashes
  • Memory access violation logs
  • Suspicious process creation from browser

Network Indicators:

  • Connections to known malicious domains from Safari/WebKit processes
  • Unusual outbound traffic patterns

SIEM Query:

process_name:"Safari" OR process_name:"WebKit" AND (event_type:crash OR memory_violation OR suspicious_child_process)

🔗 References

📤 Share & Export