First published: Tue Nov 19 2024(Updated: )
A cookie management issue was addressed with improved state management. Processing maliciously crafted web content may lead to a cross site scripting attack.
Credit: product-security@apple.com product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Multiple Products | ||
Apple Safari | <18.1.1 | |
Apple iPadOS | <17.7.2 | |
Apple iPadOS | >=18.0<18.1.1 | |
Apple iPhone OS | <17.7.2 | |
Apple iPhone OS | >=18.0<18.1.1 | |
Apple macOS | >=15.0<15.1.1 | |
Apple visionOS | <2.1.1 | |
debian/webkit2gtk | <=2.44.2-1~deb11u1<=2.46.0-2~deb12u1 | 2.46.4-1~deb11u1 2.46.4-1~deb12u1 2.46.4-1 |
debian/wpewebkit | <=2.38.6-1~deb11u1<=2.38.6-1 | 2.46.4-1 |
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-44309 has been classified as a high severity vulnerability due to its potential to enable cross site scripting attacks.
To fix CVE-2024-44309, update your Safari browser to version 18.1.1 or later, or update your iOS/iPadOS devices to version 17.7.2 or later.
CVE-2024-44309 affects multiple Apple products, including Safari, iOS, iPadOS, macOS, and visionOS versions prior to the specified updates.
CVE-2024-44309 is a cookie management vulnerability that can lead to cross site scripting (XSS) attacks.
CVE-2024-44309 was identified due to issues with state management in cookie handling that could be exploited through malicious web content.