First published: Mon Oct 28 2024(Updated: )
Accessibility. The issue was addressed with improved authentication.
Credit: Rizki Maulana (rmrizki.my.id) Matthew Butler Jake Derouin an anonymous researcher Ivan Fratric Google Project ZeroK宝 @Pwnrin pattern-f @pattern_F_ Loadshine LabHikerell Loadshine LabHossein Lotfi @hosselot Trend Micro Zero Day InitiativeWang Yu CyberservalJunsung Lee Trend Micro Zero Day InitiativeJex Amro Ye Zhang @VAR10CK Baidu SecurityZiyi Zhou Jiao Tong University) @Shanghai Tianxiao Hou Jiao Tong University) @Shanghai Mateusz Krzywicki @krzywix Ben Roeder Hichem Maloufi Christian Mina Ismail Amzdak Nimrat Khalsa Davis Dai James Gill @infosec.exchange) @jjtech an anonymous researcher Dawn Security Lab of JDYinyi Wu @_3ndy1 Dawn Security Lab of JDNarendra Bhati Cyber Security at Suma Soft PvtManager Cyber Security at Suma Soft PvtPune (India) Lucas Di Tomase Michael DePlante @izobashi Trend Micro Zero Day InitiativeBing Shi Alibaba GroupWenchao Li Alibaba GroupXiaolong Bai Alibaba Group Indiana University BloomingtonLuyi Xing Indiana University BloomingtonKirin @Pwnrin Bistrit Dahal Kenneth Chew Rodolphe Brunetti @eisw0lf Abhay Kailasia @abhay_kailasia Lakshmi Narain College of Technology Bhopal IndiaSrijan Poudel 7feilee Cristian Dinca (icmd.tech) Dalibor Milanovic Richard Hyunho Im with Route Zero Security @richeeta Braylon @softwarescool Wojciech Regula SecuRingQ1IQ @q1iqF P1umer @p1umer CVE-2024-39573 CVE-2024-38477 CVE-2024-38476 Mickey Jin @patch1t Alexandre Bedard Ronny Stiftel Zhongquan Li @Guluisacat Garrett Moon Excited Pixel LLCArsenii Kostromin (0x3c3e) Toomas Römer Jaime Bertran Noah Gregory (wts.dev) Un3xploitable CW Research IncBohdan Stasiuk @Bohdan_Stasiuk CW Research IncPedro Tôrres @t0rr3sp3dr0 Mickey Jin @patch1t KandjiCsaba Fitzl @theevilbit KandjiRyan Dowd @_rdowd Gergely Kalman @gergely_kalman Csaba Fitzl @theevilbit Halle Winkler Politepix (theoffcuts.org) dw0r! Trend Micro Zero Day InitiativeBohdan Stasiuk @Bohdan_Stasiuk 냥냥 Justin Saboo product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/webkit2gtk | <=2.44.2-1~deb11u1<=2.46.0-2~deb12u1 | 2.46.3-1~deb11u2 2.46.3-1~deb12u1 2.46.3-1 |
debian/wpewebkit | <=2.38.6-1~deb11u1<=2.38.6-1 | 2.46.3-1 |
tvOS | <18.1 | 18.1 |
Apple Mobile Safari | <18.1 | 18.1 |
Apple iOS, iPadOS, and watchOS | <18.1 | 18.1 |
Apple iOS, iPadOS, and watchOS | <18.1 | 18.1 |
Apple iOS, iPadOS, and watchOS | <17.7.1 | 17.7.1 |
Apple iOS, iPadOS, and watchOS | <17.7.1 | 17.7.1 |
Apple iOS, iPadOS, and watchOS | <11.1 | 11.1 |
visionOS | <2.1 | 2.1 |
Apple Mobile Safari | <18.1 | |
Apple iOS, iPadOS, and watchOS | <17.7.1 | |
Apple iOS, iPadOS, and watchOS | >=18.0<18.1 | |
iStyle @cosme iPhone OS | <17.7.1 | |
iStyle @cosme iPhone OS | >=18.0<18.1 | |
Apple iOS and macOS | <15.1 | |
tvOS | <18.1 | |
visionOS | <2.1 | |
Apple iOS, iPadOS, and watchOS | <11.1 | |
macOS | <15.1 | 15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2024-44296 has been classified with a severity rating that indicates a significant security risk due to the potential bypass of Content Security Policy.
To fix CVE-2024-44296, users should update to the latest versions of affected Apple software, specifically to tvOS 18.1, iOS 18.1, and iPadOS 18.1.
CVE-2024-44296 affects several Apple products including Safari, iPadOS, iPhone OS, macOS, tvOS, visionOS, and watchOS prior to the specified versions.
As of now, there are no official workarounds for CVE-2024-44296; updating the software is the recommended action.
CVE-2024-44296 may allow attackers to exploit vulnerabilities in web content, potentially leading to unauthorized access to sensitive information by circumventing Content Security Policy.