CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-44308

High Severity
SVRS
44/100

CVSSv3
NA/10

EPSS
0.00334/1

CVE-2024-44308 is a critical vulnerability in Apple's Safari, iOS, iPadOS, macOS, and visionOS that allows for arbitrary code execution when processing maliciously crafted web content. This vulnerability has been actively exploited, specifically on Intel-based Mac systems. The issue has been addressed in the latest updates, including Safari 18.1.1, iOS 17.7.2, and macOS Sequoia 15.1.1. While the CVSS score is 0, indicating a base score, the SOCRadar Vulnerability Risk Score (SVRS) is 44, showing a moderate risk level when considering real-world threat intelligence. The "In The Wild" tag and confirmed active exploitation elevate the real-world risk, requiring prompt patching despite the seemingly low CVSS score. This CVE is particularly significant due to the potential for attackers to gain complete control of affected systems through web-based attacks. The urgency is amplified because of the exploit availability.

In The Wild
CISA KEV
Exploit Avaliable
2024-11-20

2024-11-20
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-44308 is a vulnerability in Apple Safari, macOS, and iOS that allows for arbitrary code execution if a user interacts with maliciously crafted web content. The vulnerability arises from flawed checks within the web browser's processing mechanisms, potentially leading to attackers gaining control over affected devices.

While the CVSS score is 0, the SOCRadar Vulnerability Risk Score (SVRS) is 52, indicating a moderate severity and potential for exploitation. The SVRS considers a wider range of factors beyond technical aspects, making it a valuable indicator of real-world risk.

Key Insights

  • Active Exploitation: Apple acknowledges that this vulnerability has been actively exploited in the wild, specifically on Intel-based Mac systems. This signifies that attackers have developed and are using exploits, posing an immediate threat to users.
  • Code Execution: The vulnerability enables arbitrary code execution, granting attackers complete control over the affected device. This allows them to steal sensitive data, install malware, and potentially access the entire system.
  • Web-Based Attack: The vulnerability is triggered through maliciously crafted web content, meaning users can be compromised simply by visiting a compromised website or opening a malicious email attachment.
  • Wide Impact: The vulnerability affects multiple Apple products, including Safari, macOS, and iOS. This wide range of affected devices increases the potential impact and emphasizes the need for immediate action.

Mitigation Strategies

  • Software Updates: Install the latest security updates for Safari, macOS, and iOS as soon as they are available. This includes Safari 18.1.1, iOS 17.7.2 and iPadOS 17.7.2, macOS Sequoia 15.1.1, iOS 18.1.1 and iPadOS 18.1.1, and visionOS 2.1.1.
  • Security Awareness Training: Educate users on the importance of verifying website authenticity and avoiding suspicious links and attachments. This helps minimize the risk of users interacting with malicious content.
  • Web Filtering: Consider implementing web filtering solutions to block access to known malicious websites and prevent users from encountering malicious content.
  • Endpoint Protection: Deploy robust endpoint security solutions with real-time threat detection and response capabilities to identify and neutralize malicious activity before it can cause harm.

Additional Information

For further information, please consult the CVE details at https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44308. If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

TitleSoftware LinkDate
Apple Multiple Products Code Execution Vulnerabilityhttps://www.cisa.gov/search?g=CVE-2024-443082024-11-21
Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

1.838
2025-04-18
1.838 | Newly Added (101)Security Vulnerability fixed in Thunderbird 128.9.2Security Vulnerability fixed in Firefox 137.0.2Oracle MySQL CVE-2024-13176 VulnerabilityOracle JDK CVE-2024-27856 Code Injection Vulnerability
fortiguard.com
rss
forum
news
25th November – Threat Intelligence Report
lorenf2025-02-01
25th November – Threat Intelligence Report | For the latest discoveries in cyber research for the week of 25th November, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES The Library of Congress, part of the US Capitol complex and home to the world’s largest media collection, was hacked by a foreign adversary, exposing email communications between Library staff and congressional […] The post 25th November – Threat Intelligence Report appeared first on Check Point
checkpoint.com
rss
forum
news
Data Breaches Digest - Week 47 2024
Dunkie ([email protected])2025-02-01
Data Breaches Digest - Week 47 2024 | Welcome to this week's Data Breaches Digest, a catalogue of links concerning Data Breaches and Cyber Security that were published on the Internet during the period between 18th November and 24th November 2024. 24th November <br
dbdigest.com
rss
forum
news
CISA Adds Three Known Exploited Vulnerabilities to Catalog
CISA2024-12-17
CISA Adds Three Known Exploited Vulnerabilities to Catalog | CISA has added three new vulnerabilities to its&nbsp;Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-44308&nbsp;Apple Multiple Products Code Execution Vulnerability <a href="https://www.cve.org/CVERecord?id=CVE-2024-44309" title="Apple Multiple Products Cross-Site Scripting
us-cert.gov
rss
forum
news
Haftanın Siber Güvenlik Özeti: 18 Kasım – 24 Kasım
Görkem Hınçer2024-12-02
Haftanın Siber Güvenlik Özeti: 18 Kasım – 24 Kasım | Siber güvenlik dünyasında &#8220;devlet destekli saldırılar&#8221; ve &#8220;kritik zafiyetler&#8221; gibi terimleri sık sık duyuyoruz. Ancak bu terimlerin arkasında neler olup bittiğini gerçekten biliyor muyuz? Bu haftanın öne çıkan siber güvenlik haberleri, yalnızca manşetlerdeki hacker’lardan ibaret değil; dijital risklerin hayatlarımızı nasıl şekillendirdiğini gösteriyor. Telekom ağlarına yönelik saldırılar, yalnızca veri çalmakla ilgili değil; aynı zamanda bir güç gösterisi. Hacker’lar, hem bireysel hem de ticari hayatımızın merkezindeki bu ağları kontrol altına almayı hedefliyor. Yazılımlardaki kritik güvenlik açıkları (CVE&#8217;ler) ise, sıradan birer numaradan öte, günlük
siberguvenlik.web.tr
rss
forum
news
Apple Safari JavaScriptCore Remote Code Execution Flaw Exploited in the Wild
Divya2024-12-02
Apple Safari JavaScriptCore Remote Code Execution Flaw Exploited in the Wild | A critical vulnerability identified as CVE-2024-44308 has been actively exploited in the wild, affecting multiple versions of Apple Safari across iOS, visionOS, and macOS platforms. This flaw, located within WebKit&#8217;s DFG JIT compiler, poses a significant threat by allowing remote code execution (RCE). Affected Software and Versions Here&#8217;s a table summarizing the affected software and [&#8230;] The post Apple Safari JavaScriptCore Remote Code Execution Flaw Exploited in
gbhackers.com
rss
forum
news
Update now! Apple confirms vulnerabilities are already being exploited
2024-11-20
Update now! Apple confirms vulnerabilities are already being exploited | Apple has released security updates that look especially important for Intel-based Macs because they are already being exploited in the wild.Apple has released security patches for most of its operating systems, including iOS, Mac, iPadOS, Safari, and visionOS. The updates for iOS and Intel-based Mac systems are especially important, as they tackle vulnerabilities that are being actively exploited by cybercriminals. You should make sure you update as soon as
code
file
macos
application

Social Media

New post from https://t.co/uXvPWJy6tj (CVE-2024-44308 | Apple visionOS on Intel Web Content Remote Code Execution (Nessus ID 211691)) has been published on https://t.co/ZSQGRNv9lU
0
0
0
Webkit ACE with PoC Exploit: CVE-2024-44308 https://t.co/xR3HHE6CTM.
0
0
0
(CVE-2024-44308 - exploited ITW)[JSC][DFG]'compilePutByValForIntTypedArray' invoked -&gt; 'getIntTypedArrayStoreOperand' adds slow path -&gt; 'scratch2GPR' allocated after slow path added -&gt; inconsistent global state when slow path taken -&gt; ... -&gt; ACE https://t.co/MEao6EhvsF @_clem1
0
0
3
1/9 🚨 @Apple patches urgent zero-days in macOS &amp; iOS. CVE-2024-44308 &amp; CVE-2024-44309 under attack! #AppleSecurity #ZeroDayThreat #CyberAlert
0
0
0
2/9 CVE-2024-44308 enables code execution via JavaScriptCore. Update now to stay safe! #macOSUpdate #iOSUpdate #CyberProtection
0
0
0
@MISINFOSCIENCE @th3v0t4ry If I may strongly disagree. Apple has a bug bounty program, as do Microsoft, and Google. The security programs at Google and Microsoft routinely cooperate with Apple to help them resolve bugs in ios and OSX - CVE-2024-44308 (fixed in 18.1.1) was disclosed by active exploit that
1
0
0
One vulnerability is tracked as CVE-2024-44308, and when exploited, can allow an attacker to remotely execute code
1
0
0
Apple released patches for 2 zero-day vuln's in macOS &amp; iOS. Both bugs, linked to processing malicious web content, have been exploited on Intel-based Macs. CVE-2024-44308 allows arbitrary code execution via JavaScriptCore &amp; CVE-2024-44309 enables XSS through WebKit.
1
0
0
#Apple released emergency #security updates to fix two #zeroday #vulnerabilities (CVE-2024-44308 &amp; CVE-2024-44309) that were exploited in attacks on #Intel-based #Mac systems. #Cybersecurity #infosec https://t.co/LRA5kMGiPA https://t.co/DOa0UKDhZf
0
0
0
@Crypto_TownHall Don't underestimate the threat; CVE-2024-44308 and CVE-2024-44309 are serious vulnerabilities. Keep your devices secure ⚠️
0
0
0

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]https://support.apple.com/en-us/121752
[email protected]https://support.apple.com/en-us/121753
[email protected]https://support.apple.com/en-us/121754
[email protected]https://support.apple.com/en-us/121755
[email protected]https://support.apple.com/en-us/121756

CWE Details

No CWE details found for this CVE

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence