Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-40789: Processing maliciously crafted web content may lead to an unexpected process crash in Apple Safari

0
Medium
VulnerabilityCVE-2024-40789cvecve-2024-40789
Published: Mon Jul 29 2024 (07/29/2024, 22:16:57 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: Safari

Description

An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, Safari 17.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing maliciously crafted web content may lead to an unexpected process crash.

AI-Powered Analysis

AILast updated: 11/04/2025, 17:18:46 UTC

Technical Analysis

CVE-2024-40789 is an out-of-bounds access vulnerability classified under CWE-125 that affects Apple Safari and related Apple operating systems. The root cause is insufficient bounds checking when processing certain web content, which can lead to accessing memory outside the intended buffer. This results in an unexpected process crash, causing a denial of service condition. The vulnerability affects Safari on iOS, iPadOS, macOS Sonoma, watchOS, tvOS, and visionOS, with fixes released in Safari 17.6 and OS updates such as iOS 16.7.9 and macOS 14.6. The CVSS 3.1 base score is 6.5 (medium severity), reflecting that the attack vector is network-based with low attack complexity, no privileges required, but user interaction is necessary (the user must visit a malicious web page). The impact is limited to availability, with no confidentiality or integrity loss reported. No known exploits have been observed in the wild, but the vulnerability could be leveraged by attackers to disrupt services or user experience by crashing Safari processes. This type of vulnerability is often used in targeted denial of service attacks or as part of a multi-stage exploit chain, although no such chaining is currently documented.

Potential Impact

For European organizations, the primary impact is availability disruption on Apple devices running vulnerable versions of Safari and related OSes. This can affect employees’ productivity, especially in environments heavily reliant on Apple hardware and Safari for web access. Critical sectors such as finance, healthcare, and government could experience service interruptions if attackers exploit this vulnerability to crash browsers en masse or target specific users. While no data confidentiality or integrity loss is indicated, repeated crashes could lead to user frustration, potential loss of session data, or interruption of web-based applications. Organizations with remote or hybrid workforces using Apple devices are particularly at risk. Additionally, denial of service attacks could be used as a distraction or part of a larger attack campaign. The lack of known exploits reduces immediate risk, but the medium severity score and ease of exploitation mean timely patching is essential to prevent future exploitation.

Mitigation Recommendations

European organizations should immediately deploy the Apple security updates that address CVE-2024-40789, including Safari 17.6 and OS updates iOS/iPadOS 16.7.9, macOS Sonoma 14.6, watchOS 10.6, tvOS 17.6, and visionOS 1.3. Ensure all managed Apple devices are updated promptly through centralized device management solutions like Apple Business Manager or Mobile Device Management (MDM) platforms. Educate users to avoid clicking on suspicious or untrusted web links, as exploitation requires user interaction. Implement network-level protections such as web filtering and DNS filtering to block access to known malicious sites. Monitor for unusual browser crashes or service disruptions that could indicate exploitation attempts. For critical environments, consider restricting Safari usage or enforcing alternative browsers until patches are applied. Maintain up-to-date incident response plans to quickly address potential denial of service incidents. Finally, keep abreast of threat intelligence updates for any emerging exploits targeting this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2024-07-10T17:11:04.689Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a2df0f0ba78a0505373d7

Added to database: 11/4/2025, 4:46:40 PM

Last enriched: 11/4/2025, 5:18:46 PM

Last updated: 12/15/2025, 7:00:45 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats