CVE-2024-23222
KEV
🔴 Łataj teraz
Błąd typu confusion w Safari umożliwia zdalne wykonanie kodu przez złośliwe treści.
CVSS
8.8
EPSS
0.6%
Exploit
weaponized
Vendor
apple
Opis źródłowy (NVD)
A type confusion issue was addressed with improved checks. This issue is fixed in Safari 17.3, iOS 15.8.7 and iPadOS 15.8.7, iOS 16.7.5 and iPadOS 16.7.5, iOS 17.3 and iPadOS 17.3, macOS Monterey 12.7.3, macOS Sonoma 14.3, macOS Ventura 13.6.4, tvOS 17.3, visionOS 1.0.2. Processing maliciously crafted web content may lead to arbitrary code execution. This fix associated with the Coruna exploit was shipped in iOS 17.3 on January 22, 2024. This update brings that fix to devices that cannot update to the latest iOS version.
rce
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 8.8 |
| CISA KEV (aktywnie wykorzystywane) | Tak |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.6% |
| Opublikowano (NVD) | 2024-01-23 01:15:11 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-03 11:42:31 UTC |
Referencje
- https://support.apple.com/en-us/118479 (product-security@apple.com) [Release Notes, Vendor Advisory]
- https://support.apple.com/en-us/120304 (product-security@apple.com) [Release Notes, Vendor Advisory]
- https://support.apple.com/en-us/120305 (product-security@apple.com) [Release Notes, Vendor Advisory]
- https://support.apple.com/en-us/120307 (product-security@apple.com) [Release Notes, Vendor Advisory]
- https://support.apple.com/en-us/120309 (product-security@apple.com) [Release Notes, Vendor Advisory]
- https://support.apple.com/en-us/120310 (product-security@apple.com) [Release Notes, Vendor Advisory]
- https://support.apple.com/en-us/120311 (product-security@apple.com) [Release Notes, Vendor Advisory]
- https://support.apple.com/en-us/120339 (product-security@apple.com) [Release Notes, Vendor Advisory]
- https://support.apple.com/en-us/126632 (product-security@apple.com) [Release Notes, Vendor Advisory]
- http://seclists.org/fulldisclosure/2024/Feb/6 (af854a3a-2127-422b-91ae-364da2661108) [Third Party Advisory]
- http://seclists.org/fulldisclosure/2024/Jan/34 (af854a3a-2127-422b-91ae-364da2661108) [Third Party Advisory]
- http://seclists.org/fulldisclosure/2024/Jan/40 (af854a3a-2127-422b-91ae-364da2661108) [Third Party Advisory]
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/US43EQFC2IS66EA2CPAZFH2RQ6WD7PKF/ (af854a3a-2127-422b-91ae-364da2661108) [Broken Link]
- https://support.apple.com/en-us/HT214055 (af854a3a-2127-422b-91ae-364da2661108) [Release Notes, Vendor Advisory]
- https://support.apple.com/en-us/HT214059 (af854a3a-2127-422b-91ae-364da2661108) [Release Notes, Vendor Advisory]
- https://support.apple.com/en-us/HT214061 (af854a3a-2127-422b-91ae-364da2661108) [Release Notes, Vendor Advisory]
- https://support.apple.com/kb/HT214055 (af854a3a-2127-422b-91ae-364da2661108) [Release Notes, Vendor Advisory]
- https://support.apple.com/kb/HT214056 (af854a3a-2127-422b-91ae-364da2661108) [Release Notes, Vendor Advisory]
- https://support.apple.com/kb/HT214057 (af854a3a-2127-422b-91ae-364da2661108) [Release Notes, Vendor Advisory]
- https://support.apple.com/kb/HT214058 (af854a3a-2127-422b-91ae-364da2661108) [Release Notes, Vendor Advisory]
- https://support.apple.com/kb/HT214059 (af854a3a-2127-422b-91ae-364da2661108) [Release Notes, Vendor Advisory]
- https://support.apple.com/kb/HT214061 (af854a3a-2127-422b-91ae-364da2661108) [Release Notes, Vendor Advisory]
- https://support.apple.com/kb/HT214063 (af854a3a-2127-422b-91ae-364da2661108) [Release Notes, Vendor Advisory]
- https://support.apple.com/kb/HT214070 (af854a3a-2127-422b-91ae-364da2661108) [Release Notes, Vendor Advisory]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-23222 (134c704f-9b21-4f2e-91b3-4a467353bcc0) [US Government Resource]