CVE-2024-44244
Apple Safari vulnerability analysis and mitigation

Overview

A memory corruption vulnerability (CVE-2024-44244) was discovered in WebKit, affecting multiple Apple operating systems. The issue was disclosed and patched in October 2024, affecting iOS 18.1 and iPadOS 18.1, watchOS 11.1, visionOS 2.1, tvOS 18.1, macOS Sequoia 15.1, and Safari 18.1. The vulnerability was discovered by an anonymous researcher, Q1IQ (@q1iqF) and P1umer (@p1umer) (Apple Security).

Technical details

The vulnerability is classified as a memory corruption issue in WebKit (WebKit Bugzilla: 279780) that occurs when processing maliciously crafted web content. The issue was addressed with improved input validation. The vulnerability has been assigned a CVSS v3.1 base score of 4.3 (MEDIUM) with a vector string of CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L, indicating it is network accessible, requires low attack complexity, and needs user interaction (NVD).

Impact

When exploited, this vulnerability can lead to an unexpected process crash when processing maliciously crafted web content. The impact is primarily focused on availability, with no direct impact on confidentiality or integrity of the system (Apple Security).

Mitigation and workarounds

Apple has addressed this vulnerability by implementing improved input validation in the affected systems. Users are advised to update to the following versions: iOS 18.1 and iPadOS 18.1, watchOS 11.1, visionOS 2.1, tvOS 18.1, macOS Sequoia 15.1, or Safari 18.1, depending on their device (Apple Security).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management