First published: Mon Oct 28 2024(Updated: )
Last updated 18 November 2024
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Safari | <18.1 | |
Apple iPadOS | <17.7.1 | |
Apple iPadOS | >=18.0<18.1 | |
Apple iPhone OS | <17.7.1 | |
Apple iPhone OS | >=18.0<18.1 | |
Apple macOS | <15.1 | |
Apple tvOS | <18.1 | |
Apple visionOS | <2.1 | |
Apple watchOS | <11.1 | |
debian/webkit2gtk | <=2.44.2-1~deb11u1<=2.46.0-2~deb12u1 | 2.46.3-1~deb11u2 2.46.3-1~deb12u1 2.46.3-1 |
debian/wpewebkit | <=2.38.6-1~deb11u1<=2.38.6-1 | 2.46.3-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-44296 has been classified with a severity rating that indicates a significant security risk due to the potential bypass of Content Security Policy.
To fix CVE-2024-44296, users should update to the latest versions of affected Apple software, specifically to tvOS 18.1, iOS 18.1, and iPadOS 18.1.
CVE-2024-44296 affects several Apple products including Safari, iPadOS, iPhone OS, macOS, tvOS, visionOS, and watchOS prior to the specified versions.
As of now, there are no official workarounds for CVE-2024-44296; updating the software is the recommended action.
CVE-2024-44296 may allow attackers to exploit vulnerabilities in web content, potentially leading to unauthorized access to sensitive information by circumventing Content Security Policy.