Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-40785: Processing maliciously crafted web content may lead to a cross site scripting attack in Apple Safari

0
Medium
VulnerabilityCVE-2024-40785cvecve-2024-40785
Published: Mon Jul 29 2024 (07/29/2024, 22:16:56 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: Safari

Description

This issue was addressed with improved checks. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, Safari 17.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing maliciously crafted web content may lead to a cross site scripting attack.

AI-Powered Analysis

AILast updated: 11/04/2025, 17:18:30 UTC

Technical Analysis

CVE-2024-40785 is a cross-site scripting (XSS) vulnerability identified in Apple Safari, affecting multiple Apple operating systems including iOS (16.7.9 and 17.6), iPadOS (16.7.9 and 17.6), macOS Sonoma 14.6, watchOS 10.6, tvOS 17.6, and visionOS 1.3. The vulnerability stems from insufficient validation and sanitization of web content processed by Safari, allowing an attacker to inject and execute malicious scripts within the context of the browser. This can lead to unauthorized access to sensitive information such as cookies, session tokens, or other browser-stored data, and potentially enable session hijacking or further attacks on the user’s environment. The CVSS v3.1 score of 6.1 reflects a medium severity, with an attack vector over the network, low attack complexity, no privileges required, but requiring user interaction (e.g., visiting a malicious webpage). The scope is changed, indicating that the vulnerability can affect resources beyond the vulnerable component. Apple has mitigated this vulnerability by implementing improved checks and input validation in the affected Safari versions and OS updates. No public exploits have been observed, but the vulnerability remains a concern due to the widespread use of Safari in Apple ecosystems. The underlying weakness corresponds to CWE-79, which is a common web security flaw related to improper neutralization of input leading to XSS.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to confidentiality and integrity of user data accessed through Safari on Apple devices. Attackers could exploit this flaw to steal session cookies, credentials, or other sensitive information, potentially leading to unauthorized access to corporate resources or personal data breaches. The impact is heightened for sectors relying heavily on Apple hardware and Safari, such as creative industries, finance, and government agencies that use Apple devices for secure communications. Although availability is not directly affected, the compromise of user sessions can lead to broader security incidents and loss of trust. The requirement for user interaction limits mass exploitation but targeted phishing or social engineering campaigns could leverage this vulnerability effectively. Given the popularity of Apple devices in Europe, unpatched systems could be a vector for attackers to infiltrate networks or exfiltrate data.

Mitigation Recommendations

European organizations should immediately ensure that all Apple devices are updated to the patched versions of iOS (16.7.9 or 17.6), iPadOS, macOS Sonoma 14.6, watchOS 10.6, tvOS 17.6, and visionOS 1.3 or later. IT administrators should enforce update policies and verify compliance through device management solutions. Additionally, organizations should educate users about the risks of interacting with untrusted web content and phishing attempts that could exploit this XSS vulnerability. Deploying web filtering solutions to block access to known malicious sites and monitoring network traffic for suspicious activity related to Safari usage can provide additional layers of defense. Web application firewalls (WAFs) should be configured to detect and block XSS payloads where possible. For high-risk environments, consider restricting the use of Safari or implementing browser isolation technologies until patches are fully deployed. Regular security audits and penetration testing focusing on client-side vulnerabilities can help identify residual risks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2024-07-10T17:11:04.689Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a2deef0ba78a050537260

Added to database: 11/4/2025, 4:46:38 PM

Last enriched: 11/4/2025, 5:18:30 PM

Last updated: 12/17/2025, 10:06:15 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats