CVE-2024-23222: Processing maliciously crafted web content may lead to arbitrary code execution. This fix associated with the Coruna exploit was shipped in iOS 17.3 on January 22, 2024. This update brings that fix to devices that cannot update to the latest iOS version. in Apple Safari
CVE-2024-23222 is a high-severity type confusion vulnerability in Apple Safari and WebKit that may allow processing of maliciously crafted web content to lead to arbitrary code execution. The issue was addressed with improved checks and memory handling. This vulnerability is associated with the Coruna exploit and affects multiple Apple platforms including iOS, iPadOS, macOS, tvOS, and visionOS. Apple released official patches in Safari 17. 3 and various OS updates starting January 22, 2024, including backports for devices unable to upgrade to the latest OS versions. The CVSS score is 8. 8, indicating a high impact on confidentiality, integrity, and availability. No known exploits in the wild have been reported at the time of publication. The vendor advisory confirms the availability of official fixes across affected platforms.
AI Analysis
Technical Summary
CVE-2024-23222 is a type confusion vulnerability in Apple Safari's WebKit engine that could allow an attacker to execute arbitrary code by processing maliciously crafted web content. The vulnerability was fixed by Apple through improved memory handling and additional checks in Safari 17.3, iOS 15.8.7, iOS 16.7.5, iPadOS 15.8.7, iPadOS 16.7.5, macOS Monterey 12.7.3, macOS Ventura 13.6.4, macOS Sonoma 14.3, tvOS 17.3, and visionOS 1.0.2. The fix addresses the Coruna exploit and extends support to devices that cannot update to the latest iOS version. The CVSS v3.1 base score is 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), indicating that the vulnerability can be exploited remotely over the network with low attack complexity, no privileges required, but user interaction is needed. Successful exploitation could lead to full compromise of confidentiality, integrity, and availability of the affected system.
Potential Impact
Successful exploitation of this vulnerability may allow an attacker to execute arbitrary code on the affected device with the privileges of the Safari process, potentially leading to full compromise of the device. The CVSS score of 8.8 reflects high impact on confidentiality, integrity, and availability. The vulnerability affects multiple Apple platforms and versions, including iOS, iPadOS, macOS, tvOS, and visionOS. There are no confirmed reports of active exploitation in the wild at the time of this advisory.
Mitigation Recommendations
Apple has released official patches addressing CVE-2024-23222 in Safari 17.3 and multiple OS updates including iOS 15.8.7, iOS 16.7.5, iPadOS 15.8.7, iPadOS 16.7.5, macOS Monterey 12.7.3, macOS Ventura 13.6.4, macOS Sonoma 14.3, tvOS 17.3, and visionOS 1.0.2. Users and administrators should apply these updates promptly to mitigate the risk. Devices that cannot update to the latest OS versions have received backported fixes in these updates. No additional mitigation steps are indicated by the vendor advisory.
CVE-2024-23222: Processing maliciously crafted web content may lead to arbitrary code execution. This fix associated with the Coruna exploit was shipped in iOS 17.3 on January 22, 2024. This update brings that fix to devices that cannot update to the latest iOS version. in Apple Safari
Description
CVE-2024-23222 is a high-severity type confusion vulnerability in Apple Safari and WebKit that may allow processing of maliciously crafted web content to lead to arbitrary code execution. The issue was addressed with improved checks and memory handling. This vulnerability is associated with the Coruna exploit and affects multiple Apple platforms including iOS, iPadOS, macOS, tvOS, and visionOS. Apple released official patches in Safari 17. 3 and various OS updates starting January 22, 2024, including backports for devices unable to upgrade to the latest OS versions. The CVSS score is 8. 8, indicating a high impact on confidentiality, integrity, and availability. No known exploits in the wild have been reported at the time of publication. The vendor advisory confirms the availability of official fixes across affected platforms.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-23222 is a type confusion vulnerability in Apple Safari's WebKit engine that could allow an attacker to execute arbitrary code by processing maliciously crafted web content. The vulnerability was fixed by Apple through improved memory handling and additional checks in Safari 17.3, iOS 15.8.7, iOS 16.7.5, iPadOS 15.8.7, iPadOS 16.7.5, macOS Monterey 12.7.3, macOS Ventura 13.6.4, macOS Sonoma 14.3, tvOS 17.3, and visionOS 1.0.2. The fix addresses the Coruna exploit and extends support to devices that cannot update to the latest iOS version. The CVSS v3.1 base score is 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), indicating that the vulnerability can be exploited remotely over the network with low attack complexity, no privileges required, but user interaction is needed. Successful exploitation could lead to full compromise of confidentiality, integrity, and availability of the affected system.
Potential Impact
Successful exploitation of this vulnerability may allow an attacker to execute arbitrary code on the affected device with the privileges of the Safari process, potentially leading to full compromise of the device. The CVSS score of 8.8 reflects high impact on confidentiality, integrity, and availability. The vulnerability affects multiple Apple platforms and versions, including iOS, iPadOS, macOS, tvOS, and visionOS. There are no confirmed reports of active exploitation in the wild at the time of this advisory.
Mitigation Recommendations
Apple has released official patches addressing CVE-2024-23222 in Safari 17.3 and multiple OS updates including iOS 15.8.7, iOS 16.7.5, iPadOS 15.8.7, iPadOS 16.7.5, macOS Monterey 12.7.3, macOS Ventura 13.6.4, macOS Sonoma 14.3, tvOS 17.3, and visionOS 1.0.2. Users and administrators should apply these updates promptly to mitigate the risk. Devices that cannot update to the latest OS versions have received backported fixes in these updates. No additional mitigation steps are indicated by the vendor advisory.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- apple
- Date Reserved
- 2024-01-12T22:22:21.478Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f45d9182aa0cae28897fb
Added to database: 6/3/2025, 6:58:33 PM
Last enriched: 4/9/2026, 10:59:20 PM
Last updated: 5/9/2026, 8:09:40 PM
Views: 70
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.