Known Exploited Vulnerability
8.8
HIGH CVSS 3.1
CVE-2024-23222
Apple Multiple Products WebKit Type Confusion Vulnerability - [Actively Exploited]
Description

A type confusion issue was addressed with improved checks. This issue is fixed in iOS 17.3 and iPadOS 17.3, macOS Sonoma 14.3, tvOS 17.3, iOS 16.7.5 and iPadOS 16.7.5, iOS 15.8.7 and iPadOS 15.8.7. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited.

INFO

Published Date :

Jan. 23, 2024, 1:15 a.m.

Last Modified :

March 12, 2026, 1:25 p.m.

Remotely Exploit :

Yes !
CISA Notification
CISA KEV (Known Exploited Vulnerabilities)

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild.

Description :

Apple iOS, iPadOS, macOS, tvOS, and Safari WebKit contain a type confusion vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.

Required Action :

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Known Ransomware Campaign Use:

Unknown

Notes :

https://support.apple.com/en-us/HT214055, https://support.apple.com/en-us/HT214056, https://support.apple.com/en-us/HT214057, https://support.apple.com/en-us/HT214058, https://support.apple.com/en-us/HT214059, https://support.apple.com/en-us/HT214061, https://support.apple.com/en-us/HT214063 ; https://nvd.nist.gov/vuln/detail/CVE-2024-23222

Affected Products

The following products are affected by CVE-2024-23222 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Apple macos
2 Apple iphone_os
3 Apple tvos
4 Apple ipados
5 Apple visionos
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 3.1 HIGH [email protected]
CVSS 3.1 HIGH 134c704f-9b21-4f2e-91b3-4a467353bcc0
Solution
This vulnerability requires updating multiple Apple products to the latest available versions.
  • Update iOS to version 17.3 or later.
  • Update macOS to version 14.3, 13.6.4, or 12.7.3 or later.
  • Update tvOS to version 17.3 or later.
  • Update affected packages according to vendor guidance.
Public PoC/Exploit Available at Github

CVE-2024-23222 has a 8 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2024-23222.

URL Resource
https://support.apple.com/en-us/120304 Release Notes Vendor Advisory
https://support.apple.com/en-us/120309 Release Notes Vendor Advisory
https://support.apple.com/en-us/120310 Release Notes Vendor Advisory
https://support.apple.com/en-us/120311 Release Notes Vendor Advisory
https://support.apple.com/en-us/126632 Release Notes Vendor Advisory
http://seclists.org/fulldisclosure/2024/Feb/6 Third Party Advisory
http://seclists.org/fulldisclosure/2024/Jan/34 Third Party Advisory
http://seclists.org/fulldisclosure/2024/Jan/40 Third Party Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/US43EQFC2IS66EA2CPAZFH2RQ6WD7PKF/ Broken Link
https://support.apple.com/en-us/HT214055 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT214059 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT214061 Release Notes Vendor Advisory
https://support.apple.com/kb/HT214055 Release Notes Vendor Advisory
https://support.apple.com/kb/HT214056 Release Notes Vendor Advisory
https://support.apple.com/kb/HT214057 Release Notes Vendor Advisory
https://support.apple.com/kb/HT214058 Release Notes Vendor Advisory
https://support.apple.com/kb/HT214059 Release Notes Vendor Advisory
https://support.apple.com/kb/HT214061 Release Notes Vendor Advisory
https://support.apple.com/kb/HT214063 Release Notes Vendor Advisory
https://support.apple.com/kb/HT214070 Vendor Advisory Release Notes
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-23222 US Government Resource
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2024-23222 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2024-23222 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Analyze and deobfuscate the Coruna Exploit Kit (CVE-2024-23222) to enhance understanding and detection of related threats.

aigc analysis c cmake ds ejercicios fic gei informatica llm mathcomp pp pro2 pro2324 so writerside

JavaScript HTML

Updated: 19 hours, 30 minutes ago
0 stars 0 fork 0 watcher
Born at : March 15, 2026, 4:36 p.m. This repo has been linked 1 different CVEs too.

Adaptation of Cassowary CVE-2024-23222 for Linux x86_64

JavaScript

Updated: 2 days, 14 hours ago
6 stars 1 fork 1 watcher
Born at : March 13, 2026, 11:37 p.m. This repo has been linked 1 different CVEs too.

None

Python JavaScript HTML

Updated: 1 day, 2 hours ago
0 stars 1 fork 1 watcher
Born at : March 13, 2026, 8:41 p.m. This repo has been linked 1 different CVEs too.

Comprehensive deobfuscated research of the Coruna iOS exploit kit targeting CVE-2024-23222. Analysis of WebKit Type Confusion, PAC Bypass, and Sandbox Escape

HTML JavaScript

Updated: 6 days, 12 hours ago
1 stars 0 fork 0 watcher
Born at : March 10, 2026, 5:49 a.m. This repo has been linked 1 different CVEs too.

analysis of coruna malware exploit (heavily obfuscate so i heavily used AI)

JavaScript HTML

Updated: 2 days, 3 hours ago
24 stars 9 fork 9 watcher
Born at : March 4, 2026, 2:48 p.m. This repo has been linked 1 different CVEs too.

macOS Kernel & OS Fuzzer - Lion to latest

Makefile Objective-C Assembly

Updated: 1 week, 6 days ago
0 stars 0 fork 0 watcher
Born at : Feb. 8, 2026, 11:08 p.m. This repo has been linked 10 different CVEs too.

None

Python

Updated: 3 days, 16 hours ago
0 stars 0 fork 0 watcher
Born at : Jan. 26, 2026, 8:17 a.m. This repo has been linked 2857 different CVEs too.

apple cve list

Updated: 2 months, 1 week ago
159 stars 16 fork 16 watcher
Born at : Jan. 7, 2019, 12:12 p.m. This repo has been linked 60 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2024-23222 vulnerability anywhere in the article.

  • The Hacker News
Apple Fixes WebKit Vulnerability Enabling Same-Origin Policy Bypass on iOS and macOS

Apple on Tuesday released its first round of Background Security Improvements to address a security flaw in WebKit that affects iOS, iPadOS, and macOS. The vulnerability, tracked as CVE-2026-20643 (CV ... Read more

Published Date: Mar 18, 2026 (11 hours, 38 minutes ago)
  • CybersecurityNews
Apple Released Emergency Updates for iOS 15.8.7 to Thwart ‘Coruna’ Exploit Kit

Apple Released Emergency Updates iOS 15.8.7 Apple has rolled out an emergency security update, iOS 15.8.7 and iPadOS 15.8.7, to protect older devices from a severe threat known as the ‘Coruna’ exploit ... Read more

Published Date: Mar 13, 2026 (5 days, 6 hours ago)
  • Daily CyberSecurity
Legacy Under Siege: Apple Pushes Emergency iOS 15.8.7 Update to Thwart ‘Coruna’ Exploit Kit

In a major move to protect users of older hardware, Apple has released critical security updates for iOS 15.8.7 and iPadOS 15.8.7. This emergency response follows a stark warning from Google regarding ... Read more

Published Date: Mar 13, 2026 (5 days, 15 hours ago)
  • TheCyberThrone
Apple Patches Coruna Exploit Kit — Older iOS/iPadOS Devices

March 13, 2026What is Coruna?Researchers from Google and iVerify disclosed in early March 2026 a sophisticated exploit kit dubbed Coruna, described as “nation-state grade,” enabling mass exploitation ... Read more

Published Date: Mar 13, 2026 (5 days, 16 hours ago)
  • The Hacker News
Apple Issues Security Updates for Older iOS Devices Targeted by Coruna WebKit Exploit

Apple on Wednesday backported fixes for a security flaw in iOS, iPadOS, and macOS Sonoma to older versions after it was found to be used as part of the Coruna exploit kit. The vulnerability, tracked a ... Read more

Published Date: Mar 12, 2026 (6 days, 8 hours ago)
  • security.nl
Apple beschermt oude iPhones tegen actief aangevallen kwetsbaarheid

Apple heeft beveiligingsupdates uitgebracht om oude iPhones en iPads tegen actief aangevallen kwetsbaarheden te beschermen. Onlangs werd bekend dat aanvallers de beveiligingslekken, waarvoor Apple al ... Read more

Published Date: Mar 12, 2026 (6 days, 9 hours ago)
  • Ars Technica
Feds take notice of iOS vulnerabilities exploited under mysterious circumstances

Coruna is also notable for its use by three distinct hacking groups. Google first detected its use in February of last year in an operation conducted by a “customer of a surveillance vendor.” The vuln ... Read more

Published Date: Mar 06, 2026 (1 week, 4 days ago)
  • Daily CyberSecurity
Coruna: The High-Powered iOS Exploit Kit Proliferating Across the Global Threat Landscape

Coruna iOS exploit kit timeline The Google Threat Intelligence Group (GTIG) has detailed the curtain on “Coruna,” a formidable iOS exploit kit that has transitioned from the hands of commercial survei ... Read more

Published Date: Mar 05, 2026 (1 week, 6 days ago)
  • The Register
Kaspersky dismisses claims Coruna iPhone exploit kit is connected to NSA-linked operation

Russian cybersecurity outfit Kaspersky is waving away claims that an iPhone exploit kit recently uncovered by Google was developed by the same people who were behind a group of zero-days that allegedl ... Read more

Published Date: Mar 04, 2026 (2 weeks ago)
  • The Hacker News
Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1

Google said it identified a "new and powerful" exploit kit dubbed Coruna (aka CryptoWaters) targeting Apple iPhone models running iOS versions between 13.0 and 17.2.1. The exploit kit featured five fu ... Read more

Published Date: Mar 04, 2026 (2 weeks ago)
  • CybersecurityNews
Coruna Exploit Kit With 23 Exploits Hacked Thousands of iPhones

Coruna iOS Exploit Kit Google’s Threat Intelligence Group (GTIG) has uncovered Coruna, a sophisticated iOS exploit kit containing 23 exploits across five full exploit chains that compromised thousands ... Read more

Published Date: Mar 04, 2026 (2 weeks ago)
  • Help Net Security
Coruna: Spy-grade iOS exploit kit powering financial crime

A powerful iOS exploit kit has circulated among multiple threat actors over the past year, moving from a commercial surveillance operation to state-linked espionage campaigns and, ultimately, ended in ... Read more

Published Date: Mar 03, 2026 (2 weeks ago)
  • Google Cloud
Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit

Introduction Google Threat Intelligence Group (GTIG) has identified a new and powerful exploit kit targeting Apple iPhone models running iOS version 13.0 (released in September 2019) up to version 17. ... Read more

Published Date: Mar 03, 2026 (2 weeks, 1 day ago)
  • Daily CyberSecurity
The £1.5bn Showdown: Apple Appeals Landmark Ruling Over “Unfair” App Store Fees

Reports indicate that Apple has appealed the ruling of the UK Competition Appeal Tribunal (CAT) to the higher Court of Appeal, signaling that it has no intention of readily acquiescing to the court’s ... Read more

Published Date: Dec 30, 2025 (2 months, 2 weeks ago)
  • Daily CyberSecurity
Apple AI Shakeup: Giannandrea Out, Former Google Gemini Chief Amar Subramanya Hired

Apple has announced a major leadership reshuffle, confirming that Senior Vice President of Machine Learning and AI Strategy John Giannandrea will step down in the spring of next year — marking the end ... Read more

Published Date: Dec 02, 2025 (3 months, 2 weeks ago)
  • Daily CyberSecurity
Touchscreen MacBook Pro & Foldable iPhone: Apple’s “Most Pivotal Year Yet” Revealed

In addition to the upcoming satellite features for the iPhone, Bloomberg News has outlined Apple’s ambitious 2026 product roadmap, describing it as “the company’s most pivotal year yet.”According to M ... Read more

Published Date: Nov 10, 2025 (4 months, 1 week ago)
  • Daily CyberSecurity
Apple Planning $350 Smart Display (2026) and Robotic Desktop Device (2027), Manufactured in Vietnam

According to a report by Bloomberg News, Apple is actively expanding its smart home product line, with plans to launch a smart display featuring an integrated FaceTime camera in 2026, followed by the ... Read more

Published Date: Oct 16, 2025 (5 months ago)
  • Daily CyberSecurity
Next-Gen AirPods: Apple Developing H3 Chip and Camera-Equipped Pro Model for Vision Pro Integration

With the official launch of AirPods Pro 3 last month, the market had widely anticipated that Apple would debut a next-generation audio chip in this model. Instead, the company opted to retain the H2 c ... Read more

Published Date: Oct 13, 2025 (5 months ago)
  • Daily CyberSecurity
Apple Is Quietly Testing an AI Chatbot for Its Store Employees

Aaron Perris of MacRumors has revealed that Apple is internally testing an AI chatbot named “Asa”, designed primarily to assist Apple Store retail employees in more quickly mastering the features and ... Read more

Published Date: Sep 01, 2025 (6 months, 2 weeks ago)
  • Daily CyberSecurity
Apple Is Reportedly Launching a $599 MacBook to Take On Chromebooks

Reports have long suggested that Apple is planning to reintroduce a more affordable MacBook, rumored to feature the A18 Pro processor. According to sources cited by the DigiTimes, components for this ... Read more

Published Date: Aug 11, 2025 (7 months, 1 week ago)

The following table lists the changes that have been made to the CVE-2024-23222 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Modified Analysis by [email protected]

    Mar. 12, 2026

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 13.0 up to (excluding) 13.6.4 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 14.0 up to (excluding) 14.3 *cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* versions up to (excluding) 17.3 *cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.2 *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions up to (excluding) 16.7.5 *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions up to (excluding) 16.7.5 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions up to (excluding) 12.7.3 *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions from (including) 17.0 up to (excluding) 17.3 *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions from (including) 17.0 up to (excluding) 17.3 OR *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 13.0 up to (excluding) 13.6.4 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 14.0 up to (excluding) 14.3 *cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* versions up to (excluding) 17.3 *cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.2 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions up to (excluding) 12.7.3 *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions from (including) 17.0 up to (excluding) 17.3 *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions from (including) 17.0 up to (excluding) 17.3 *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions up to (excluding) 15.8.7 *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions up to (excluding) 15.8.7 *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions from (including) 16.0 up to (excluding) 16.7.5 *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions from (including) 16.0 up to (excluding) 16.7.5
    Added Reference Type Apple Inc.: https://support.apple.com/en-us/120304 Types: Release Notes, Vendor Advisory
    Added Reference Type Apple Inc.: https://support.apple.com/en-us/120309 Types: Release Notes, Vendor Advisory
    Added Reference Type Apple Inc.: https://support.apple.com/en-us/120310 Types: Release Notes, Vendor Advisory
    Added Reference Type Apple Inc.: https://support.apple.com/en-us/120311 Types: Release Notes, Vendor Advisory
    Added Reference Type Apple Inc.: https://support.apple.com/en-us/126632 Types: Release Notes, Vendor Advisory
    Changed Reference Type CVE: https://support.apple.com/kb/HT214070 Types: Vendor Advisory CVE: https://support.apple.com/kb/HT214070 Types: Release Notes, Vendor Advisory
  • CVE Modified by [email protected]

    Mar. 12, 2026

    Action Type Old Value New Value
    Changed Description A type confusion issue was addressed with improved checks. This issue is fixed in iOS 17.3 and iPadOS 17.3, macOS Sonoma 14.3, tvOS 17.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited. A type confusion issue was addressed with improved checks. This issue is fixed in iOS 17.3 and iPadOS 17.3, macOS Sonoma 14.3, tvOS 17.3, iOS 16.7.5 and iPadOS 16.7.5, iOS 15.8.7 and iPadOS 15.8.7. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited.
    Added Reference https://support.apple.com/en-us/120304
    Added Reference https://support.apple.com/en-us/120309
    Added Reference https://support.apple.com/en-us/120310
    Added Reference https://support.apple.com/en-us/120311
    Added Reference https://support.apple.com/en-us/126632
    Removed Reference https://support.apple.com/en-us/HT214055
    Removed Reference https://support.apple.com/en-us/HT214059
    Removed Reference https://support.apple.com/en-us/HT214061
    Removed Reference https://support.apple.com/kb/HT214055
    Removed Reference https://support.apple.com/kb/HT214056
    Removed Reference https://support.apple.com/kb/HT214057
    Removed Reference https://support.apple.com/kb/HT214058
    Removed Reference https://support.apple.com/kb/HT214059
    Removed Reference https://support.apple.com/kb/HT214061
    Removed Reference https://support.apple.com/kb/HT214063
    Removed Reference Type https://support.apple.com/en-us/HT214055 Types: Release Notes, Vendor Advisory
    Removed Reference Type https://support.apple.com/en-us/HT214059 Types: Release Notes, Vendor Advisory
    Removed Reference Type https://support.apple.com/en-us/HT214061 Types: Release Notes, Vendor Advisory
    Removed Reference Type https://support.apple.com/kb/HT214055 Types: Release Notes, Vendor Advisory
    Removed Reference Type https://support.apple.com/kb/HT214056 Types: Release Notes, Vendor Advisory
    Removed Reference Type https://support.apple.com/kb/HT214057 Types: Release Notes, Vendor Advisory
    Removed Reference Type https://support.apple.com/kb/HT214058 Types: Release Notes, Vendor Advisory
    Removed Reference Type https://support.apple.com/kb/HT214059 Types: Release Notes, Vendor Advisory
    Removed Reference Type https://support.apple.com/kb/HT214061 Types: Release Notes, Vendor Advisory
    Removed Reference Type https://support.apple.com/kb/HT214063 Types: Release Notes, Vendor Advisory
  • Modified Analysis by [email protected]

    Nov. 05, 2025

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 13.0 up to (excluding) 13.6.4 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 14.0 up to (excluding) 14.3 *cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* versions up to (excluding) 17.3 *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions up to (excluding) 16.7.5 *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions up to (excluding) 16.7.5 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions up to (excluding) 12.7.3 *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions from (including) 17.0 up to (excluding) 17.3 *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions from (including) 17.0 up to (excluding) 17.3 OR *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 13.0 up to (excluding) 13.6.4 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 14.0 up to (excluding) 14.3 *cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* versions up to (excluding) 17.3 *cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.2 *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions up to (excluding) 16.7.5 *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions up to (excluding) 16.7.5 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions up to (excluding) 12.7.3 *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions from (including) 17.0 up to (excluding) 17.3 *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions from (including) 17.0 up to (excluding) 17.3
    Added Reference Type CVE: http://seclists.org/fulldisclosure/2024/Feb/6 Types: Third Party Advisory
    Added Reference Type CVE: http://seclists.org/fulldisclosure/2024/Jan/34 Types: Third Party Advisory
    Added Reference Type CVE: http://seclists.org/fulldisclosure/2024/Jan/40 Types: Third Party Advisory
    Added Reference Type CVE: https://lists.fedoraproject.org/archives/list/[email protected]/message/US43EQFC2IS66EA2CPAZFH2RQ6WD7PKF/ Types: Broken Link
    Added Reference Type CVE: https://support.apple.com/kb/HT214070 Types: Vendor Advisory
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 04, 2025

    Action Type Old Value New Value
    Added Reference http://seclists.org/fulldisclosure/2024/Feb/6
    Added Reference http://seclists.org/fulldisclosure/2024/Jan/34
    Added Reference http://seclists.org/fulldisclosure/2024/Jan/40
    Added Reference https://lists.fedoraproject.org/archives/list/[email protected]/message/US43EQFC2IS66EA2CPAZFH2RQ6WD7PKF/
    Added Reference https://support.apple.com/kb/HT214070
  • Modified Analysis by [email protected]

    Oct. 23, 2025

    Action Type Old Value New Value
    Added Reference Type CISA-ADP: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-23222 Types: US Government Resource
  • CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0

    Oct. 21, 2025

    Action Type Old Value New Value
    Added Reference https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-23222
  • CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0

    Oct. 21, 2025

    Action Type Old Value New Value
    Removed Reference https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-23222
  • CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0

    Oct. 21, 2025

    Action Type Old Value New Value
    Added Reference https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-23222
  • Modified Analysis by [email protected]

    Jun. 03, 2025

    Action Type Old Value New Value
  • CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0

    Jun. 03, 2025

    Action Type Old Value New Value
    Added CWE CWE-843
  • Modified Analysis by [email protected]

    Feb. 28, 2025

    Action Type Old Value New Value
  • CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0

    Feb. 03, 2025

    Action Type Old Value New Value
    Added CVSS V3.1 AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Modified Analysis by [email protected]

    Nov. 29, 2024

    Action Type Old Value New Value
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://support.apple.com/en-us/HT214055
    Added Reference https://support.apple.com/en-us/HT214059
    Added Reference https://support.apple.com/en-us/HT214061
    Added Reference https://support.apple.com/kb/HT214055
    Added Reference https://support.apple.com/kb/HT214056
    Added Reference https://support.apple.com/kb/HT214057
    Added Reference https://support.apple.com/kb/HT214058
    Added Reference https://support.apple.com/kb/HT214059
    Added Reference https://support.apple.com/kb/HT214061
    Added Reference https://support.apple.com/kb/HT214063
  • Modified Analysis by [email protected]

    Aug. 14, 2024

    Action Type Old Value New Value
    Changed Reference Type https://support.apple.com/kb/HT214055 No Types Assigned https://support.apple.com/kb/HT214055 Release Notes, Vendor Advisory
    Changed Reference Type https://support.apple.com/kb/HT214056 No Types Assigned https://support.apple.com/kb/HT214056 Release Notes, Vendor Advisory
    Changed Reference Type https://support.apple.com/kb/HT214057 Vendor Advisory https://support.apple.com/kb/HT214057 Release Notes, Vendor Advisory
    Changed Reference Type https://support.apple.com/kb/HT214058 Vendor Advisory https://support.apple.com/kb/HT214058 Release Notes, Vendor Advisory
    Changed Reference Type https://support.apple.com/kb/HT214059 No Types Assigned https://support.apple.com/kb/HT214059 Release Notes, Vendor Advisory
    Changed Reference Type https://support.apple.com/kb/HT214061 Vendor Advisory https://support.apple.com/kb/HT214061 Release Notes, Vendor Advisory
    Changed Reference Type https://support.apple.com/kb/HT214063 Vendor Advisory https://support.apple.com/kb/HT214063 Release Notes, Vendor Advisory
  • CVE Modified by [email protected]

    Jun. 12, 2024

    Action Type Old Value New Value
    Added Reference Apple Inc. https://support.apple.com/kb/HT214059 [No types assigned]
    Added Reference Apple Inc. https://support.apple.com/kb/HT214055 [No types assigned]
    Added Reference Apple Inc. https://support.apple.com/kb/HT214056 [No types assigned]
  • Modified Analysis by [email protected]

    Jun. 10, 2024

    Action Type Old Value New Value
    Changed Reference Type https://support.apple.com/kb/HT214057 No Types Assigned https://support.apple.com/kb/HT214057 Vendor Advisory
    Changed Reference Type https://support.apple.com/kb/HT214058 No Types Assigned https://support.apple.com/kb/HT214058 Vendor Advisory
    Changed Reference Type https://support.apple.com/kb/HT214061 No Types Assigned https://support.apple.com/kb/HT214061 Vendor Advisory
    Changed Reference Type https://support.apple.com/kb/HT214063 No Types Assigned https://support.apple.com/kb/HT214063 Vendor Advisory
    Changed CPE Configuration OR *cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* versions up to (excluding) 17.3 *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions from (excluding) 16.0 up to (excluding) 16.7.5 *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions from (excluding) 17.0 up to (excluding) 17.3 *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions from (excluding) 16.0 up to (excluding) 16.7.5 *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions from (excluding) 17.0 up to (excluding) 17.3 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 12.0 up to (excluding) 12.7.3 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 13.0 up to (excluding) 13.6.4 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 14.0 up to (excluding) 14.3 *cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* versions up to (excluding) 17.3 *cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.2 OR *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions up to (excluding) 16.7.5 *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions from (including) 17.0 up to (excluding) 17.3 *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions up to (excluding) 16.7.5 *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions from (including) 17.0 up to (excluding) 17.3 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions up to (excluding) 12.7.3 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 13.0 up to (excluding) 13.6.4 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 14.0 up to (excluding) 14.3 *cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* versions up to (excluding) 17.3
  • CVE Modified by [email protected]

    Jun. 10, 2024

    Action Type Old Value New Value
    Added Reference Apple Inc. https://support.apple.com/kb/HT214063 [No types assigned]
    Added Reference Apple Inc. https://support.apple.com/kb/HT214057 [No types assigned]
    Added Reference Apple Inc. https://support.apple.com/kb/HT214058 [No types assigned]
    Added Reference Apple Inc. https://support.apple.com/kb/HT214061 [No types assigned]
  • CVE CISA KEV Update by 9119a7d8-5eab-497f-8521-727c672e3725

    May. 16, 2024

    Action Type Old Value New Value
    Changed Vulnerability Name Apple Multiple Products Type Confusion Vulnerability Apple Multiple Products WebKit Type Confusion Vulnerability
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CVE Modified by [email protected]

    Mar. 08, 2024

    Action Type Old Value New Value
    Changed Description A type confusion issue was addressed with improved checks. This issue is fixed in tvOS 17.3, iOS 17.3 and iPadOS 17.3, macOS Sonoma 14.3, iOS 16.7.5 and iPadOS 16.7.5, Safari 17.3, macOS Ventura 13.6.4, macOS Monterey 12.7.3, visionOS 1.0.2. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited. A type confusion issue was addressed with improved checks. This issue is fixed in iOS 17.3 and iPadOS 17.3, macOS Sonoma 14.3, tvOS 17.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited.
    Removed Reference Apple Inc. https://support.apple.com/en-us/HT214058
    Removed Reference Apple Inc. https://support.apple.com/en-us/HT214063
    Removed Reference Apple Inc. https://support.apple.com/en-us/HT214056
    Removed Reference Apple Inc. https://support.apple.com/en-us/HT214057
    Removed Reference Apple Inc. https://support.apple.com/en-us/HT214070
    Removed Reference Apple Inc. https://support.apple.com/kb/HT214070
  • CVE Modified by [email protected]

    Feb. 29, 2024

    Action Type Old Value New Value
    Added Reference Apple Inc. https://support.apple.com/kb/HT214070 [No types assigned]
  • Modified Analysis by [email protected]

    Feb. 26, 2024

    Action Type Old Value New Value
    Changed Reference Type https://support.apple.com/en-us/HT214070 No Types Assigned https://support.apple.com/en-us/HT214070 Release Notes, Vendor Advisory
    Changed CPE Configuration OR *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions from (excluding) 16.0 up to (excluding) 16.7.5 *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions from (excluding) 17.0 up to (excluding) 17.3 *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions from (excluding) 16.0 up to (excluding) 16.7.5 *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions from (excluding) 17.0 up to (excluding) 17.3 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 12.0 up to (excluding) 12.7.3 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 13.0 up to (excluding) 13.6.4 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 14.0 up to (excluding) 14.3 *cpe:2.3:o:apple:safari:*:*:*:*:*:*:*:* versions up to (excluding) 17.3 *cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* versions up to (excluding) 17.3 OR *cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* versions up to (excluding) 17.3 *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions from (excluding) 16.0 up to (excluding) 16.7.5 *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions from (excluding) 17.0 up to (excluding) 17.3 *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions from (excluding) 16.0 up to (excluding) 16.7.5 *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions from (excluding) 17.0 up to (excluding) 17.3 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 12.0 up to (excluding) 12.7.3 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 13.0 up to (excluding) 13.6.4 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 14.0 up to (excluding) 14.3 *cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* versions up to (excluding) 17.3 *cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.2
  • CVE Modified by [email protected]

    Feb. 21, 2024

    Action Type Old Value New Value
    Changed Description A type confusion issue was addressed with improved checks. This issue is fixed in tvOS 17.3, iOS 17.3 and iPadOS 17.3, macOS Sonoma 14.3, iOS 16.7.5 and iPadOS 16.7.5, Safari 17.3, macOS Ventura 13.6.4, macOS Monterey 12.7.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited. A type confusion issue was addressed with improved checks. This issue is fixed in tvOS 17.3, iOS 17.3 and iPadOS 17.3, macOS Sonoma 14.3, iOS 16.7.5 and iPadOS 16.7.5, Safari 17.3, macOS Ventura 13.6.4, macOS Monterey 12.7.3, visionOS 1.0.2. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited.
    Added Reference Apple Inc. https://support.apple.com/en-us/HT214070 [No types assigned]
    Removed Reference Apple Inc. http://seclists.org/fulldisclosure/2024/Jan/27
    Removed Reference Apple Inc. http://seclists.org/fulldisclosure/2024/Jan/33
    Removed Reference Apple Inc. http://seclists.org/fulldisclosure/2024/Jan/36
    Removed Reference Apple Inc. http://seclists.org/fulldisclosure/2024/Jan/34
    Removed Reference Apple Inc. http://seclists.org/fulldisclosure/2024/Jan/37
    Removed Reference Apple Inc. http://seclists.org/fulldisclosure/2024/Jan/38
    Removed Reference Apple Inc. http://seclists.org/fulldisclosure/2024/Jan/40
    Removed Reference Apple Inc. http://seclists.org/fulldisclosure/2024/Feb/6
    Removed Reference Apple Inc. http://www.openwall.com/lists/oss-security/2024/02/05/8
    Removed Reference Apple Inc. https://lists.fedoraproject.org/archives/list/[email protected]/message/X2VJMEDT4GL42AQVHSYOT6DIVJDZWIV4/
    Removed Reference Apple Inc. https://lists.fedoraproject.org/archives/list/[email protected]/message/US43EQFC2IS66EA2CPAZFH2RQ6WD7PKF/
  • CVE Modified by [email protected]

    Feb. 11, 2024

    Action Type Old Value New Value
    Added Reference Apple Inc. https://lists.fedoraproject.org/archives/list/[email protected]/message/US43EQFC2IS66EA2CPAZFH2RQ6WD7PKF/ [No types assigned]
  • CVE Modified by [email protected]

    Feb. 09, 2024

    Action Type Old Value New Value
    Added Reference Apple Inc. https://lists.fedoraproject.org/archives/list/[email protected]/message/X2VJMEDT4GL42AQVHSYOT6DIVJDZWIV4/ [No types assigned]
  • CVE Modified by [email protected]

    Feb. 06, 2024

    Action Type Old Value New Value
    Added Reference Apple Inc. http://www.openwall.com/lists/oss-security/2024/02/05/8 [No types assigned]
  • CVE Modified by [email protected]

    Feb. 04, 2024

    Action Type Old Value New Value
    Added Reference Apple Inc. http://seclists.org/fulldisclosure/2024/Feb/6 [No types assigned]
  • Initial Analysis by [email protected]

    Jan. 30, 2024

    Action Type Old Value New Value
    Added CVSS V3.1 NIST AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
    Changed Reference Type http://seclists.org/fulldisclosure/2024/Jan/27 No Types Assigned http://seclists.org/fulldisclosure/2024/Jan/27 Third Party Advisory
    Changed Reference Type http://seclists.org/fulldisclosure/2024/Jan/33 No Types Assigned http://seclists.org/fulldisclosure/2024/Jan/33 Third Party Advisory
    Changed Reference Type http://seclists.org/fulldisclosure/2024/Jan/34 No Types Assigned http://seclists.org/fulldisclosure/2024/Jan/34 Third Party Advisory
    Changed Reference Type http://seclists.org/fulldisclosure/2024/Jan/36 No Types Assigned http://seclists.org/fulldisclosure/2024/Jan/36 Third Party Advisory
    Changed Reference Type http://seclists.org/fulldisclosure/2024/Jan/37 No Types Assigned http://seclists.org/fulldisclosure/2024/Jan/37 Third Party Advisory
    Changed Reference Type http://seclists.org/fulldisclosure/2024/Jan/38 No Types Assigned http://seclists.org/fulldisclosure/2024/Jan/38 Third Party Advisory
    Changed Reference Type http://seclists.org/fulldisclosure/2024/Jan/40 No Types Assigned http://seclists.org/fulldisclosure/2024/Jan/40 Third Party Advisory
    Changed Reference Type https://support.apple.com/en-us/HT214055 No Types Assigned https://support.apple.com/en-us/HT214055 Release Notes, Vendor Advisory
    Changed Reference Type https://support.apple.com/en-us/HT214056 No Types Assigned https://support.apple.com/en-us/HT214056 Release Notes, Vendor Advisory
    Changed Reference Type https://support.apple.com/en-us/HT214057 No Types Assigned https://support.apple.com/en-us/HT214057 Release Notes, Vendor Advisory
    Changed Reference Type https://support.apple.com/en-us/HT214058 No Types Assigned https://support.apple.com/en-us/HT214058 Release Notes, Vendor Advisory
    Changed Reference Type https://support.apple.com/en-us/HT214059 No Types Assigned https://support.apple.com/en-us/HT214059 Release Notes, Vendor Advisory
    Changed Reference Type https://support.apple.com/en-us/HT214061 No Types Assigned https://support.apple.com/en-us/HT214061 Release Notes, Vendor Advisory
    Changed Reference Type https://support.apple.com/en-us/HT214063 No Types Assigned https://support.apple.com/en-us/HT214063 Release Notes, Vendor Advisory
    Added CWE NIST CWE-843
    Added CPE Configuration OR *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions from (excluding) 16.0 up to (excluding) 16.7.5 *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions from (excluding) 17.0 up to (excluding) 17.3 *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions from (excluding) 16.0 up to (excluding) 16.7.5 *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions from (excluding) 17.0 up to (excluding) 17.3 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 12.0 up to (excluding) 12.7.3 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 13.0 up to (excluding) 13.6.4 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 14.0 up to (excluding) 14.3 *cpe:2.3:o:apple:safari:*:*:*:*:*:*:*:* versions up to (excluding) 17.3 *cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* versions up to (excluding) 17.3
  • CVE Modified by [email protected]

    Jan. 26, 2024

    Action Type Old Value New Value
    Added Reference Apple Inc. http://seclists.org/fulldisclosure/2024/Jan/40 [No types assigned]
  • CVE Modified by [email protected]

    Jan. 26, 2024

    Action Type Old Value New Value
    Added Reference Apple Inc. http://seclists.org/fulldisclosure/2024/Jan/33 [No types assigned]
    Added Reference Apple Inc. http://seclists.org/fulldisclosure/2024/Jan/36 [No types assigned]
    Added Reference Apple Inc. http://seclists.org/fulldisclosure/2024/Jan/34 [No types assigned]
    Added Reference Apple Inc. http://seclists.org/fulldisclosure/2024/Jan/37 [No types assigned]
    Added Reference Apple Inc. http://seclists.org/fulldisclosure/2024/Jan/38 [No types assigned]
  • CVE Modified by [email protected]

    Jan. 26, 2024

    Action Type Old Value New Value
    Added Reference Apple Inc. http://seclists.org/fulldisclosure/2024/Jan/27 [No types assigned]
  • CVE CISA KEV Update by 9119a7d8-5eab-497f-8521-727c672e3725

    Jan. 24, 2024

    Action Type Old Value New Value
    Added Vulnerability Name Apple Multiple Products Type Confusion Vulnerability
    Added Required Action Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
    Added Due Date 2024-02-13
    Added Date Added 2024-01-23
  • CVE Received by [email protected]

    Jan. 23, 2024

    Action Type Old Value New Value
    Added Description A type confusion issue was addressed with improved checks. This issue is fixed in tvOS 17.3, iOS 17.3 and iPadOS 17.3, macOS Sonoma 14.3, iOS 16.7.5 and iPadOS 16.7.5, Safari 17.3, macOS Ventura 13.6.4, macOS Monterey 12.7.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited.
    Added Reference Apple Inc. https://support.apple.com/en-us/HT214058 [No types assigned]
    Added Reference Apple Inc. https://support.apple.com/en-us/HT214059 [No types assigned]
    Added Reference Apple Inc. https://support.apple.com/en-us/HT214063 [No types assigned]
    Added Reference Apple Inc. https://support.apple.com/en-us/HT214055 [No types assigned]
    Added Reference Apple Inc. https://support.apple.com/en-us/HT214056 [No types assigned]
    Added Reference Apple Inc. https://support.apple.com/en-us/HT214061 [No types assigned]
    Added Reference Apple Inc. https://support.apple.com/en-us/HT214057 [No types assigned]
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.