CVE-2024-54551

7.5 HIGH

📋 TL;DR

This memory handling vulnerability in Apple's web content processing allows attackers to cause denial-of-service conditions. It affects users of Apple devices and software that process web content, including Safari browsers and multiple Apple operating systems. The issue was addressed through improved memory handling in recent updates.

💻 Affected Systems

Products:
  • Safari
  • watchOS
  • tvOS
  • macOS Sonoma
  • visionOS
  • iOS
  • iPadOS
Versions: Versions prior to watchOS 10.6, tvOS 17.6, Safari 17.6, macOS Sonoma 14.6, visionOS 1.3, iOS 17.6, iPadOS 17.6
Operating Systems: watchOS, tvOS, macOS, visionOS, iOS, iPadOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected Apple products are vulnerable when processing web content.

📦 What is this software?

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash or freeze requiring reboot, potentially disrupting device functionality and user productivity.

🟠

Likely Case

Application crashes or hangs when processing malicious web content, disrupting browsing sessions.

🟢

If Mitigated

Minimal impact with proper patching; unpatched systems remain vulnerable to targeted attacks.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires processing malicious web content; no public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: watchOS 10.6, tvOS 17.6, Safari 17.6, macOS Sonoma 14.6, visionOS 1.3, iOS 17.6, iPadOS 17.6

Vendor Advisory: https://support.apple.com/en-us/120909

Restart Required: No

Instructions:

1. Open Settings/System Preferences on your Apple device. 2. Navigate to Software Update/General > Software Update. 3. Download and install the latest available update. 4. For Safari on macOS, update through System Preferences > Software Update or App Store updates.

🔧 Temporary Workarounds

Disable JavaScript

all

Temporarily disable JavaScript in Safari to reduce attack surface while waiting to patch.

Safari > Preferences > Security > uncheck 'Enable JavaScript'

🧯 If You Can't Patch

  • Implement web content filtering to block malicious sites
  • Use alternative browsers temporarily and restrict Safari usage

🔍 How to Verify

Check if Vulnerable:

Check current OS/browser version against affected versions list.

Check Version:

macOS: sw_vers; iOS/iPadOS: Settings > General > About > Version; Safari: Safari > About Safari

Verify Fix Applied:

Confirm OS/browser version matches or exceeds patched versions listed.

📡 Detection & Monitoring

Log Indicators:

  • Application crash logs for Safari or related processes
  • Kernel panic logs indicating memory corruption

Network Indicators:

  • Unusual web traffic patterns to known malicious sites
  • Multiple connection attempts to suspicious domains

SIEM Query:

source="apple_system_logs" AND (process="Safari" OR process="WebKit") AND event="crash"

🔗 References

📤 Share & Export