First published: Tue Mar 05 2024(Updated: )
Accessibility. A privacy issue was addressed with improved private data redaction for log entries.
Credit: product-security@apple.com Pwn2car James Lee @Windowsrcer Johan Carlsson (joaxcar) an anonymous researcher Georg Felber Marco Squarcina CVE-2024-23235 Xinru Chi Pangu LabCVE-2024-23225 koocola ali yabuz Kirin @Pwnrin Meysam Firouzi @R00tkitsmm Trend Micro Zero Day Initiative @08Tc3wBB JamfCVE-2024-23283 Mickey Jin @patch1t CVE-2023-48795 CVE-2023-51384 CVE-2023-51385 Pedro Tôrres @t0rr3sp3dr0 Bohdan Stasiuk @Bohdan_Stasiuk Harsh Tyagi Wojciech Regula SecuRingCVE-2024-23296 Lyra Rebane (rebane2001) Matej Rabzelj CVE-2024-23238 Yiğit Can YILMAZ @yilmazcanyigit luckyu @uuulucky K宝 Fudan UniversityLFY @secsys Fudan UniversityLewis Hardy Bistrit Dahal CVE-2024-23241 CVE-2024-23242 Joshua Jewett @JoshJewett33 Matthew Loewen Deutsche Telekom Security GmbH sponsored by Bundesamt für Sicherheit in der Informationstechnik m4yfly with TianGong Team Legendsec at Qi'anxin GroupGuilherme Rambo Best Buddy AppsCsaba Fitzl @theevilbit OffSecCVE-2024-23205 CVE-2022-48554 Junsung Lee Trend Micro Zero Day InitiativeZhenjiang Zhao pangu teamQianxin CrowdStrike Counter Adversary Operations CrowdStrike Counter Adversary OperationsAmir Bazine CrowdStrike Counter Adversary OperationsKarsten König CrowdStrike Counter Adversary OperationsDohyun Lee @l33d0hyun Lyutoon Mr.R Murray Mike Marc Newlin SkySafeStephan Casas Brian McNulty CVE-2024-23291 scj643 CVE-2024-23220 Om Kothawade Cristian Dinca Computer ScienceRomania anbu1024 SecANT
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/webkit2gtk | <2.44.0-0ubuntu0.22.04.1 | 2.44.0-0ubuntu0.22.04.1 |
ubuntu/webkit2gtk | <2.44.0-0ubuntu0.23.10.1 | 2.44.0-0ubuntu0.23.10.1 |
ubuntu/webkit2gtk | <2.44.0 | 2.44.0 |
debian/webkit2gtk | <=2.36.4-1~deb10u1<=2.38.6-0+deb10u1<=2.42.2-1~deb11u1<=2.42.2-1~deb12u1 | 2.44.1-1~deb11u1 2.44.1-1~deb12u1 2.44.1-1 |
debian/wpewebkit | <=2.38.6-1~deb11u1<=2.38.6-1 | 2.44.1-1 |
Apple macOS | <14.4 | 14.4 |
tvOS | <17.4 | 17.4 |
<14.4 | 14.4 | |
Apple Mobile Safari | <17.4 | 17.4 |
Apple iOS, iPadOS, and watchOS | <10.4 | 10.4 |
Apple iOS, iPadOS, and watchOS | <17.4 | 17.4 |
Apple iOS, iPadOS, and watchOS | <17.4 | 17.4 |
Apple Mobile Safari | <17.4 | |
iPadOS | <17.4 | |
iStyle @cosme iPhone OS | <17.4 | |
Apple iOS and macOS | >=14.0<14.4 | |
tvOS | <17.4 | |
Apple iOS, iPadOS, and watchOS | <10.4 | |
Fedora | =38 | |
Fedora | =39 | |
Fedora | =40 | |
Oracle Webkitgtk4-jsc | <2.44.0 | |
WPE WebKit | <2.44.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2024-23280 has been classified as a high severity vulnerability due to its potential to allow fingerprinting of users through maliciously crafted webpages.
To fix CVE-2024-23280, update to the latest versions of affected products, including Safari 17.4, macOS Sonoma 14.4, iOS 17.4, and iPadOS 17.4.
CVE-2024-23280 affects multiple software, including Safari, macOS, iOS, iPadOS, watchOS, and packages like webkit2gtk and wpewebkit on various Linux distributions.
CVE-2024-23280 addresses an injection issue with improved validation to prevent malicious exploitation.
There are no documented workarounds for CVE-2024-23280; the best course of action is to apply the provided updates immediately.