CVE-2024-23222
Apple Multiple Products WebKit Type Confusion Vulnerability - [Actively Exploited]
Description
A type confusion issue was addressed with improved checks. This issue is fixed in iOS 17.3 and iPadOS 17.3, macOS Sonoma 14.3, tvOS 17.3, iOS 16.7.5 and iPadOS 16.7.5, iOS 15.8.7 and iPadOS 15.8.7. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited.
INFO
Published Date :
Jan. 23, 2024, 1:15 a.m.
Last Modified :
March 12, 2026, 1:25 p.m.
Remotely Exploit :
Yes !
Source :
[email protected]
CISA KEV (Known Exploited Vulnerabilities)
For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild.
Apple iOS, iPadOS, macOS, tvOS, and Safari WebKit contain a type confusion vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Unknown
https://support.apple.com/en-us/HT214055, https://support.apple.com/en-us/HT214056, https://support.apple.com/en-us/HT214057, https://support.apple.com/en-us/HT214058, https://support.apple.com/en-us/HT214059, https://support.apple.com/en-us/HT214061, https://support.apple.com/en-us/HT214063 ; https://nvd.nist.gov/vuln/detail/CVE-2024-23222
Affected Products
The following products are affected by CVE-2024-23222
vulnerability.
Even if cvefeed.io is aware of the exact versions of the
products
that
are
affected, the information is not represented in the table below.
CVSS Scores
| Score | Version | Severity | Vector | Exploitability Score | Impact Score | Source |
|---|---|---|---|---|---|---|
| CVSS 3.1 | HIGH | [email protected] | ||||
| CVSS 3.1 | HIGH | 134c704f-9b21-4f2e-91b3-4a467353bcc0 |
Solution
- Update iOS to version 17.3 or later.
- Update macOS to version 14.3, 13.6.4, or 12.7.3 or later.
- Update tvOS to version 17.3 or later.
- Update affected packages according to vendor guidance.
Public PoC/Exploit Available at Github
CVE-2024-23222 has a 8 public
PoC/Exploit available at Github.
Go to the Public Exploits tab to see the list.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2024-23222.
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2024-23222 is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2024-23222
weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Analyze and deobfuscate the Coruna Exploit Kit (CVE-2024-23222) to enhance understanding and detection of related threats.
aigc analysis c cmake ds ejercicios fic gei informatica llm mathcomp pp pro2 pro2324 so writerside
JavaScript HTML
Adaptation of Cassowary CVE-2024-23222 for Linux x86_64
JavaScript
None
Python JavaScript HTML
Comprehensive deobfuscated research of the Coruna iOS exploit kit targeting CVE-2024-23222. Analysis of WebKit Type Confusion, PAC Bypass, and Sandbox Escape
HTML JavaScript
analysis of coruna malware exploit (heavily obfuscate so i heavily used AI)
JavaScript HTML
macOS Kernel & OS Fuzzer - Lion to latest
Makefile Objective-C Assembly
None
Python
apple cve list
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2024-23222 vulnerability anywhere in the article.
-
The Hacker News
Apple Fixes WebKit Vulnerability Enabling Same-Origin Policy Bypass on iOS and macOS
Apple on Tuesday released its first round of Background Security Improvements to address a security flaw in WebKit that affects iOS, iPadOS, and macOS. The vulnerability, tracked as CVE-2026-20643 (CV ... Read more
-
CybersecurityNews
Apple Released Emergency Updates for iOS 15.8.7 to Thwart ‘Coruna’ Exploit Kit
Apple Released Emergency Updates iOS 15.8.7 Apple has rolled out an emergency security update, iOS 15.8.7 and iPadOS 15.8.7, to protect older devices from a severe threat known as the ‘Coruna’ exploit ... Read more
-
Daily CyberSecurity
Legacy Under Siege: Apple Pushes Emergency iOS 15.8.7 Update to Thwart ‘Coruna’ Exploit Kit
In a major move to protect users of older hardware, Apple has released critical security updates for iOS 15.8.7 and iPadOS 15.8.7. This emergency response follows a stark warning from Google regarding ... Read more
-
TheCyberThrone
Apple Patches Coruna Exploit Kit — Older iOS/iPadOS Devices
March 13, 2026What is Coruna?Researchers from Google and iVerify disclosed in early March 2026 a sophisticated exploit kit dubbed Coruna, described as “nation-state grade,” enabling mass exploitation ... Read more
-
The Hacker News
Apple Issues Security Updates for Older iOS Devices Targeted by Coruna WebKit Exploit
Apple on Wednesday backported fixes for a security flaw in iOS, iPadOS, and macOS Sonoma to older versions after it was found to be used as part of the Coruna exploit kit. The vulnerability, tracked a ... Read more
-
security.nl
Apple beschermt oude iPhones tegen actief aangevallen kwetsbaarheid
Apple heeft beveiligingsupdates uitgebracht om oude iPhones en iPads tegen actief aangevallen kwetsbaarheden te beschermen. Onlangs werd bekend dat aanvallers de beveiligingslekken, waarvoor Apple al ... Read more
-
Ars Technica
Feds take notice of iOS vulnerabilities exploited under mysterious circumstances
Coruna is also notable for its use by three distinct hacking groups. Google first detected its use in February of last year in an operation conducted by a “customer of a surveillance vendor.” The vuln ... Read more
-
Daily CyberSecurity
Coruna: The High-Powered iOS Exploit Kit Proliferating Across the Global Threat Landscape
Coruna iOS exploit kit timeline The Google Threat Intelligence Group (GTIG) has detailed the curtain on “Coruna,” a formidable iOS exploit kit that has transitioned from the hands of commercial survei ... Read more
-
The Register
Kaspersky dismisses claims Coruna iPhone exploit kit is connected to NSA-linked operation
Russian cybersecurity outfit Kaspersky is waving away claims that an iPhone exploit kit recently uncovered by Google was developed by the same people who were behind a group of zero-days that allegedl ... Read more
-
The Hacker News
Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1
Google said it identified a "new and powerful" exploit kit dubbed Coruna (aka CryptoWaters) targeting Apple iPhone models running iOS versions between 13.0 and 17.2.1. The exploit kit featured five fu ... Read more
-
CybersecurityNews
Coruna Exploit Kit With 23 Exploits Hacked Thousands of iPhones
Coruna iOS Exploit Kit Google’s Threat Intelligence Group (GTIG) has uncovered Coruna, a sophisticated iOS exploit kit containing 23 exploits across five full exploit chains that compromised thousands ... Read more
-
Help Net Security
Coruna: Spy-grade iOS exploit kit powering financial crime
A powerful iOS exploit kit has circulated among multiple threat actors over the past year, moving from a commercial surveillance operation to state-linked espionage campaigns and, ultimately, ended in ... Read more
-
Google Cloud
Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit
Introduction Google Threat Intelligence Group (GTIG) has identified a new and powerful exploit kit targeting Apple iPhone models running iOS version 13.0 (released in September 2019) up to version 17. ... Read more
-
Daily CyberSecurity
The £1.5bn Showdown: Apple Appeals Landmark Ruling Over “Unfair” App Store Fees
Reports indicate that Apple has appealed the ruling of the UK Competition Appeal Tribunal (CAT) to the higher Court of Appeal, signaling that it has no intention of readily acquiescing to the court’s ... Read more
-
Daily CyberSecurity
Apple AI Shakeup: Giannandrea Out, Former Google Gemini Chief Amar Subramanya Hired
Apple has announced a major leadership reshuffle, confirming that Senior Vice President of Machine Learning and AI Strategy John Giannandrea will step down in the spring of next year — marking the end ... Read more
-
Daily CyberSecurity
Touchscreen MacBook Pro & Foldable iPhone: Apple’s “Most Pivotal Year Yet” Revealed
In addition to the upcoming satellite features for the iPhone, Bloomberg News has outlined Apple’s ambitious 2026 product roadmap, describing it as “the company’s most pivotal year yet.”According to M ... Read more
-
Daily CyberSecurity
Apple Planning $350 Smart Display (2026) and Robotic Desktop Device (2027), Manufactured in Vietnam
According to a report by Bloomberg News, Apple is actively expanding its smart home product line, with plans to launch a smart display featuring an integrated FaceTime camera in 2026, followed by the ... Read more
-
Daily CyberSecurity
Next-Gen AirPods: Apple Developing H3 Chip and Camera-Equipped Pro Model for Vision Pro Integration
With the official launch of AirPods Pro 3 last month, the market had widely anticipated that Apple would debut a next-generation audio chip in this model. Instead, the company opted to retain the H2 c ... Read more
-
Daily CyberSecurity
Apple Is Quietly Testing an AI Chatbot for Its Store Employees
Aaron Perris of MacRumors has revealed that Apple is internally testing an AI chatbot named “Asa”, designed primarily to assist Apple Store retail employees in more quickly mastering the features and ... Read more
-
Daily CyberSecurity
Apple Is Reportedly Launching a $599 MacBook to Take On Chromebooks
Reports have long suggested that Apple is planning to reintroduce a more affordable MacBook, rumored to feature the A18 Pro processor. According to sources cited by the DigiTimes, components for this ... Read more
The following table lists the changes that have been made to the
CVE-2024-23222 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
Modified Analysis by [email protected]
Mar. 12, 2026
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 13.0 up to (excluding) 13.6.4 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 14.0 up to (excluding) 14.3 *cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* versions up to (excluding) 17.3 *cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.2 *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions up to (excluding) 16.7.5 *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions up to (excluding) 16.7.5 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions up to (excluding) 12.7.3 *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions from (including) 17.0 up to (excluding) 17.3 *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions from (including) 17.0 up to (excluding) 17.3 OR *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 13.0 up to (excluding) 13.6.4 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 14.0 up to (excluding) 14.3 *cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* versions up to (excluding) 17.3 *cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.2 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions up to (excluding) 12.7.3 *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions from (including) 17.0 up to (excluding) 17.3 *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions from (including) 17.0 up to (excluding) 17.3 *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions up to (excluding) 15.8.7 *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions up to (excluding) 15.8.7 *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions from (including) 16.0 up to (excluding) 16.7.5 *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions from (including) 16.0 up to (excluding) 16.7.5 Added Reference Type Apple Inc.: https://support.apple.com/en-us/120304 Types: Release Notes, Vendor Advisory Added Reference Type Apple Inc.: https://support.apple.com/en-us/120309 Types: Release Notes, Vendor Advisory Added Reference Type Apple Inc.: https://support.apple.com/en-us/120310 Types: Release Notes, Vendor Advisory Added Reference Type Apple Inc.: https://support.apple.com/en-us/120311 Types: Release Notes, Vendor Advisory Added Reference Type Apple Inc.: https://support.apple.com/en-us/126632 Types: Release Notes, Vendor Advisory Changed Reference Type CVE: https://support.apple.com/kb/HT214070 Types: Vendor Advisory CVE: https://support.apple.com/kb/HT214070 Types: Release Notes, Vendor Advisory -
CVE Modified by [email protected]
Mar. 12, 2026
Action Type Old Value New Value Changed Description A type confusion issue was addressed with improved checks. This issue is fixed in iOS 17.3 and iPadOS 17.3, macOS Sonoma 14.3, tvOS 17.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited. A type confusion issue was addressed with improved checks. This issue is fixed in iOS 17.3 and iPadOS 17.3, macOS Sonoma 14.3, tvOS 17.3, iOS 16.7.5 and iPadOS 16.7.5, iOS 15.8.7 and iPadOS 15.8.7. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited. Added Reference https://support.apple.com/en-us/120304 Added Reference https://support.apple.com/en-us/120309 Added Reference https://support.apple.com/en-us/120310 Added Reference https://support.apple.com/en-us/120311 Added Reference https://support.apple.com/en-us/126632 Removed Reference https://support.apple.com/en-us/HT214055 Removed Reference https://support.apple.com/en-us/HT214059 Removed Reference https://support.apple.com/en-us/HT214061 Removed Reference https://support.apple.com/kb/HT214055 Removed Reference https://support.apple.com/kb/HT214056 Removed Reference https://support.apple.com/kb/HT214057 Removed Reference https://support.apple.com/kb/HT214058 Removed Reference https://support.apple.com/kb/HT214059 Removed Reference https://support.apple.com/kb/HT214061 Removed Reference https://support.apple.com/kb/HT214063 Removed Reference Type https://support.apple.com/en-us/HT214055 Types: Release Notes, Vendor Advisory Removed Reference Type https://support.apple.com/en-us/HT214059 Types: Release Notes, Vendor Advisory Removed Reference Type https://support.apple.com/en-us/HT214061 Types: Release Notes, Vendor Advisory Removed Reference Type https://support.apple.com/kb/HT214055 Types: Release Notes, Vendor Advisory Removed Reference Type https://support.apple.com/kb/HT214056 Types: Release Notes, Vendor Advisory Removed Reference Type https://support.apple.com/kb/HT214057 Types: Release Notes, Vendor Advisory Removed Reference Type https://support.apple.com/kb/HT214058 Types: Release Notes, Vendor Advisory Removed Reference Type https://support.apple.com/kb/HT214059 Types: Release Notes, Vendor Advisory Removed Reference Type https://support.apple.com/kb/HT214061 Types: Release Notes, Vendor Advisory Removed Reference Type https://support.apple.com/kb/HT214063 Types: Release Notes, Vendor Advisory -
Modified Analysis by [email protected]
Nov. 05, 2025
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 13.0 up to (excluding) 13.6.4 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 14.0 up to (excluding) 14.3 *cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* versions up to (excluding) 17.3 *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions up to (excluding) 16.7.5 *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions up to (excluding) 16.7.5 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions up to (excluding) 12.7.3 *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions from (including) 17.0 up to (excluding) 17.3 *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions from (including) 17.0 up to (excluding) 17.3 OR *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 13.0 up to (excluding) 13.6.4 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 14.0 up to (excluding) 14.3 *cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* versions up to (excluding) 17.3 *cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.2 *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions up to (excluding) 16.7.5 *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions up to (excluding) 16.7.5 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions up to (excluding) 12.7.3 *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions from (including) 17.0 up to (excluding) 17.3 *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions from (including) 17.0 up to (excluding) 17.3 Added Reference Type CVE: http://seclists.org/fulldisclosure/2024/Feb/6 Types: Third Party Advisory Added Reference Type CVE: http://seclists.org/fulldisclosure/2024/Jan/34 Types: Third Party Advisory Added Reference Type CVE: http://seclists.org/fulldisclosure/2024/Jan/40 Types: Third Party Advisory Added Reference Type CVE: https://lists.fedoraproject.org/archives/list/[email protected]/message/US43EQFC2IS66EA2CPAZFH2RQ6WD7PKF/ Types: Broken Link Added Reference Type CVE: https://support.apple.com/kb/HT214070 Types: Vendor Advisory -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
Nov. 04, 2025
Action Type Old Value New Value Added Reference http://seclists.org/fulldisclosure/2024/Feb/6 Added Reference http://seclists.org/fulldisclosure/2024/Jan/34 Added Reference http://seclists.org/fulldisclosure/2024/Jan/40 Added Reference https://lists.fedoraproject.org/archives/list/[email protected]/message/US43EQFC2IS66EA2CPAZFH2RQ6WD7PKF/ Added Reference https://support.apple.com/kb/HT214070 -
Modified Analysis by [email protected]
Oct. 23, 2025
Action Type Old Value New Value Added Reference Type CISA-ADP: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-23222 Types: US Government Resource -
CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0
Oct. 21, 2025
Action Type Old Value New Value Added Reference https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-23222 -
CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0
Oct. 21, 2025
Action Type Old Value New Value Removed Reference https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-23222 -
CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0
Oct. 21, 2025
Action Type Old Value New Value Added Reference https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-23222 -
Modified Analysis by [email protected]
Jun. 03, 2025
Action Type Old Value New Value -
CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0
Jun. 03, 2025
Action Type Old Value New Value Added CWE CWE-843 -
Modified Analysis by [email protected]
Feb. 28, 2025
Action Type Old Value New Value -
CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0
Feb. 03, 2025
Action Type Old Value New Value Added CVSS V3.1 AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H -
Modified Analysis by [email protected]
Nov. 29, 2024
Action Type Old Value New Value -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
Nov. 21, 2024
Action Type Old Value New Value Added Reference https://support.apple.com/en-us/HT214055 Added Reference https://support.apple.com/en-us/HT214059 Added Reference https://support.apple.com/en-us/HT214061 Added Reference https://support.apple.com/kb/HT214055 Added Reference https://support.apple.com/kb/HT214056 Added Reference https://support.apple.com/kb/HT214057 Added Reference https://support.apple.com/kb/HT214058 Added Reference https://support.apple.com/kb/HT214059 Added Reference https://support.apple.com/kb/HT214061 Added Reference https://support.apple.com/kb/HT214063 -
Modified Analysis by [email protected]
Aug. 14, 2024
Action Type Old Value New Value Changed Reference Type https://support.apple.com/kb/HT214055 No Types Assigned https://support.apple.com/kb/HT214055 Release Notes, Vendor Advisory Changed Reference Type https://support.apple.com/kb/HT214056 No Types Assigned https://support.apple.com/kb/HT214056 Release Notes, Vendor Advisory Changed Reference Type https://support.apple.com/kb/HT214057 Vendor Advisory https://support.apple.com/kb/HT214057 Release Notes, Vendor Advisory Changed Reference Type https://support.apple.com/kb/HT214058 Vendor Advisory https://support.apple.com/kb/HT214058 Release Notes, Vendor Advisory Changed Reference Type https://support.apple.com/kb/HT214059 No Types Assigned https://support.apple.com/kb/HT214059 Release Notes, Vendor Advisory Changed Reference Type https://support.apple.com/kb/HT214061 Vendor Advisory https://support.apple.com/kb/HT214061 Release Notes, Vendor Advisory Changed Reference Type https://support.apple.com/kb/HT214063 Vendor Advisory https://support.apple.com/kb/HT214063 Release Notes, Vendor Advisory -
CVE Modified by [email protected]
Jun. 12, 2024
Action Type Old Value New Value Added Reference Apple Inc. https://support.apple.com/kb/HT214059 [No types assigned] Added Reference Apple Inc. https://support.apple.com/kb/HT214055 [No types assigned] Added Reference Apple Inc. https://support.apple.com/kb/HT214056 [No types assigned] -
Modified Analysis by [email protected]
Jun. 10, 2024
Action Type Old Value New Value Changed Reference Type https://support.apple.com/kb/HT214057 No Types Assigned https://support.apple.com/kb/HT214057 Vendor Advisory Changed Reference Type https://support.apple.com/kb/HT214058 No Types Assigned https://support.apple.com/kb/HT214058 Vendor Advisory Changed Reference Type https://support.apple.com/kb/HT214061 No Types Assigned https://support.apple.com/kb/HT214061 Vendor Advisory Changed Reference Type https://support.apple.com/kb/HT214063 No Types Assigned https://support.apple.com/kb/HT214063 Vendor Advisory Changed CPE Configuration OR *cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* versions up to (excluding) 17.3 *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions from (excluding) 16.0 up to (excluding) 16.7.5 *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions from (excluding) 17.0 up to (excluding) 17.3 *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions from (excluding) 16.0 up to (excluding) 16.7.5 *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions from (excluding) 17.0 up to (excluding) 17.3 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 12.0 up to (excluding) 12.7.3 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 13.0 up to (excluding) 13.6.4 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 14.0 up to (excluding) 14.3 *cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* versions up to (excluding) 17.3 *cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.2 OR *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions up to (excluding) 16.7.5 *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions from (including) 17.0 up to (excluding) 17.3 *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions up to (excluding) 16.7.5 *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions from (including) 17.0 up to (excluding) 17.3 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions up to (excluding) 12.7.3 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 13.0 up to (excluding) 13.6.4 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 14.0 up to (excluding) 14.3 *cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* versions up to (excluding) 17.3 -
CVE Modified by [email protected]
Jun. 10, 2024
Action Type Old Value New Value Added Reference Apple Inc. https://support.apple.com/kb/HT214063 [No types assigned] Added Reference Apple Inc. https://support.apple.com/kb/HT214057 [No types assigned] Added Reference Apple Inc. https://support.apple.com/kb/HT214058 [No types assigned] Added Reference Apple Inc. https://support.apple.com/kb/HT214061 [No types assigned] -
CVE CISA KEV Update by 9119a7d8-5eab-497f-8521-727c672e3725
May. 16, 2024
Action Type Old Value New Value Changed Vulnerability Name Apple Multiple Products Type Confusion Vulnerability Apple Multiple Products WebKit Type Confusion Vulnerability -
CVE Modified by [email protected]
May. 14, 2024
Action Type Old Value New Value -
CVE Modified by [email protected]
Mar. 08, 2024
Action Type Old Value New Value Changed Description A type confusion issue was addressed with improved checks. This issue is fixed in tvOS 17.3, iOS 17.3 and iPadOS 17.3, macOS Sonoma 14.3, iOS 16.7.5 and iPadOS 16.7.5, Safari 17.3, macOS Ventura 13.6.4, macOS Monterey 12.7.3, visionOS 1.0.2. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited. A type confusion issue was addressed with improved checks. This issue is fixed in iOS 17.3 and iPadOS 17.3, macOS Sonoma 14.3, tvOS 17.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited. Removed Reference Apple Inc. https://support.apple.com/en-us/HT214058 Removed Reference Apple Inc. https://support.apple.com/en-us/HT214063 Removed Reference Apple Inc. https://support.apple.com/en-us/HT214056 Removed Reference Apple Inc. https://support.apple.com/en-us/HT214057 Removed Reference Apple Inc. https://support.apple.com/en-us/HT214070 Removed Reference Apple Inc. https://support.apple.com/kb/HT214070 -
CVE Modified by [email protected]
Feb. 29, 2024
Action Type Old Value New Value Added Reference Apple Inc. https://support.apple.com/kb/HT214070 [No types assigned] -
Modified Analysis by [email protected]
Feb. 26, 2024
Action Type Old Value New Value Changed Reference Type https://support.apple.com/en-us/HT214070 No Types Assigned https://support.apple.com/en-us/HT214070 Release Notes, Vendor Advisory Changed CPE Configuration OR *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions from (excluding) 16.0 up to (excluding) 16.7.5 *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions from (excluding) 17.0 up to (excluding) 17.3 *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions from (excluding) 16.0 up to (excluding) 16.7.5 *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions from (excluding) 17.0 up to (excluding) 17.3 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 12.0 up to (excluding) 12.7.3 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 13.0 up to (excluding) 13.6.4 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 14.0 up to (excluding) 14.3 *cpe:2.3:o:apple:safari:*:*:*:*:*:*:*:* versions up to (excluding) 17.3 *cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* versions up to (excluding) 17.3 OR *cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* versions up to (excluding) 17.3 *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions from (excluding) 16.0 up to (excluding) 16.7.5 *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions from (excluding) 17.0 up to (excluding) 17.3 *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions from (excluding) 16.0 up to (excluding) 16.7.5 *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions from (excluding) 17.0 up to (excluding) 17.3 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 12.0 up to (excluding) 12.7.3 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 13.0 up to (excluding) 13.6.4 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 14.0 up to (excluding) 14.3 *cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* versions up to (excluding) 17.3 *cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.2 -
CVE Modified by [email protected]
Feb. 21, 2024
Action Type Old Value New Value Changed Description A type confusion issue was addressed with improved checks. This issue is fixed in tvOS 17.3, iOS 17.3 and iPadOS 17.3, macOS Sonoma 14.3, iOS 16.7.5 and iPadOS 16.7.5, Safari 17.3, macOS Ventura 13.6.4, macOS Monterey 12.7.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited. A type confusion issue was addressed with improved checks. This issue is fixed in tvOS 17.3, iOS 17.3 and iPadOS 17.3, macOS Sonoma 14.3, iOS 16.7.5 and iPadOS 16.7.5, Safari 17.3, macOS Ventura 13.6.4, macOS Monterey 12.7.3, visionOS 1.0.2. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited. Added Reference Apple Inc. https://support.apple.com/en-us/HT214070 [No types assigned] Removed Reference Apple Inc. http://seclists.org/fulldisclosure/2024/Jan/27 Removed Reference Apple Inc. http://seclists.org/fulldisclosure/2024/Jan/33 Removed Reference Apple Inc. http://seclists.org/fulldisclosure/2024/Jan/36 Removed Reference Apple Inc. http://seclists.org/fulldisclosure/2024/Jan/34 Removed Reference Apple Inc. http://seclists.org/fulldisclosure/2024/Jan/37 Removed Reference Apple Inc. http://seclists.org/fulldisclosure/2024/Jan/38 Removed Reference Apple Inc. http://seclists.org/fulldisclosure/2024/Jan/40 Removed Reference Apple Inc. http://seclists.org/fulldisclosure/2024/Feb/6 Removed Reference Apple Inc. http://www.openwall.com/lists/oss-security/2024/02/05/8 Removed Reference Apple Inc. https://lists.fedoraproject.org/archives/list/[email protected]/message/X2VJMEDT4GL42AQVHSYOT6DIVJDZWIV4/ Removed Reference Apple Inc. https://lists.fedoraproject.org/archives/list/[email protected]/message/US43EQFC2IS66EA2CPAZFH2RQ6WD7PKF/ -
CVE Modified by [email protected]
Feb. 11, 2024
Action Type Old Value New Value Added Reference Apple Inc. https://lists.fedoraproject.org/archives/list/[email protected]/message/US43EQFC2IS66EA2CPAZFH2RQ6WD7PKF/ [No types assigned] -
CVE Modified by [email protected]
Feb. 09, 2024
Action Type Old Value New Value Added Reference Apple Inc. https://lists.fedoraproject.org/archives/list/[email protected]/message/X2VJMEDT4GL42AQVHSYOT6DIVJDZWIV4/ [No types assigned] -
CVE Modified by [email protected]
Feb. 06, 2024
Action Type Old Value New Value Added Reference Apple Inc. http://www.openwall.com/lists/oss-security/2024/02/05/8 [No types assigned] -
CVE Modified by [email protected]
Feb. 04, 2024
Action Type Old Value New Value Added Reference Apple Inc. http://seclists.org/fulldisclosure/2024/Feb/6 [No types assigned] -
Initial Analysis by [email protected]
Jan. 30, 2024
Action Type Old Value New Value Added CVSS V3.1 NIST AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Changed Reference Type http://seclists.org/fulldisclosure/2024/Jan/27 No Types Assigned http://seclists.org/fulldisclosure/2024/Jan/27 Third Party Advisory Changed Reference Type http://seclists.org/fulldisclosure/2024/Jan/33 No Types Assigned http://seclists.org/fulldisclosure/2024/Jan/33 Third Party Advisory Changed Reference Type http://seclists.org/fulldisclosure/2024/Jan/34 No Types Assigned http://seclists.org/fulldisclosure/2024/Jan/34 Third Party Advisory Changed Reference Type http://seclists.org/fulldisclosure/2024/Jan/36 No Types Assigned http://seclists.org/fulldisclosure/2024/Jan/36 Third Party Advisory Changed Reference Type http://seclists.org/fulldisclosure/2024/Jan/37 No Types Assigned http://seclists.org/fulldisclosure/2024/Jan/37 Third Party Advisory Changed Reference Type http://seclists.org/fulldisclosure/2024/Jan/38 No Types Assigned http://seclists.org/fulldisclosure/2024/Jan/38 Third Party Advisory Changed Reference Type http://seclists.org/fulldisclosure/2024/Jan/40 No Types Assigned http://seclists.org/fulldisclosure/2024/Jan/40 Third Party Advisory Changed Reference Type https://support.apple.com/en-us/HT214055 No Types Assigned https://support.apple.com/en-us/HT214055 Release Notes, Vendor Advisory Changed Reference Type https://support.apple.com/en-us/HT214056 No Types Assigned https://support.apple.com/en-us/HT214056 Release Notes, Vendor Advisory Changed Reference Type https://support.apple.com/en-us/HT214057 No Types Assigned https://support.apple.com/en-us/HT214057 Release Notes, Vendor Advisory Changed Reference Type https://support.apple.com/en-us/HT214058 No Types Assigned https://support.apple.com/en-us/HT214058 Release Notes, Vendor Advisory Changed Reference Type https://support.apple.com/en-us/HT214059 No Types Assigned https://support.apple.com/en-us/HT214059 Release Notes, Vendor Advisory Changed Reference Type https://support.apple.com/en-us/HT214061 No Types Assigned https://support.apple.com/en-us/HT214061 Release Notes, Vendor Advisory Changed Reference Type https://support.apple.com/en-us/HT214063 No Types Assigned https://support.apple.com/en-us/HT214063 Release Notes, Vendor Advisory Added CWE NIST CWE-843 Added CPE Configuration OR *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions from (excluding) 16.0 up to (excluding) 16.7.5 *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions from (excluding) 17.0 up to (excluding) 17.3 *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions from (excluding) 16.0 up to (excluding) 16.7.5 *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions from (excluding) 17.0 up to (excluding) 17.3 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 12.0 up to (excluding) 12.7.3 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 13.0 up to (excluding) 13.6.4 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions from (including) 14.0 up to (excluding) 14.3 *cpe:2.3:o:apple:safari:*:*:*:*:*:*:*:* versions up to (excluding) 17.3 *cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* versions up to (excluding) 17.3 -
CVE Modified by [email protected]
Jan. 26, 2024
Action Type Old Value New Value Added Reference Apple Inc. http://seclists.org/fulldisclosure/2024/Jan/40 [No types assigned] -
CVE Modified by [email protected]
Jan. 26, 2024
Action Type Old Value New Value Added Reference Apple Inc. http://seclists.org/fulldisclosure/2024/Jan/33 [No types assigned] Added Reference Apple Inc. http://seclists.org/fulldisclosure/2024/Jan/36 [No types assigned] Added Reference Apple Inc. http://seclists.org/fulldisclosure/2024/Jan/34 [No types assigned] Added Reference Apple Inc. http://seclists.org/fulldisclosure/2024/Jan/37 [No types assigned] Added Reference Apple Inc. http://seclists.org/fulldisclosure/2024/Jan/38 [No types assigned] -
CVE Modified by [email protected]
Jan. 26, 2024
Action Type Old Value New Value Added Reference Apple Inc. http://seclists.org/fulldisclosure/2024/Jan/27 [No types assigned] -
CVE CISA KEV Update by 9119a7d8-5eab-497f-8521-727c672e3725
Jan. 24, 2024
Action Type Old Value New Value Added Vulnerability Name Apple Multiple Products Type Confusion Vulnerability Added Required Action Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Added Due Date 2024-02-13 Added Date Added 2024-01-23 -
CVE Received by [email protected]
Jan. 23, 2024
Action Type Old Value New Value Added Description A type confusion issue was addressed with improved checks. This issue is fixed in tvOS 17.3, iOS 17.3 and iPadOS 17.3, macOS Sonoma 14.3, iOS 16.7.5 and iPadOS 16.7.5, Safari 17.3, macOS Ventura 13.6.4, macOS Monterey 12.7.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited. Added Reference Apple Inc. https://support.apple.com/en-us/HT214058 [No types assigned] Added Reference Apple Inc. https://support.apple.com/en-us/HT214059 [No types assigned] Added Reference Apple Inc. https://support.apple.com/en-us/HT214063 [No types assigned] Added Reference Apple Inc. https://support.apple.com/en-us/HT214055 [No types assigned] Added Reference Apple Inc. https://support.apple.com/en-us/HT214056 [No types assigned] Added Reference Apple Inc. https://support.apple.com/en-us/HT214061 [No types assigned] Added Reference Apple Inc. https://support.apple.com/en-us/HT214057 [No types assigned]