CVE-2024-40789: Processing maliciously crafted web content may lead to an unexpected process crash in Apple Safari
An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in Safari 17.6, iOS 16.7.9 and iPadOS 16.7.9, iOS 17.6 and iPadOS 17.6, macOS Sonoma 14.6, tvOS 17.6, visionOS 1.3, watchOS 10.6. Processing maliciously crafted web content may lead to an unexpected process crash.
AI Analysis
Technical Summary
CVE-2024-40789 is a vulnerability identified in Apple Safari and related Apple operating systems, caused by an out-of-bounds access error (CWE-125). This flaw arises from inadequate bounds checking when processing certain web content, which can be maliciously crafted to trigger an unexpected process crash. The vulnerability affects Safari 17.6 and multiple Apple OS versions including iOS, iPadOS, macOS Sonoma, tvOS, visionOS, and watchOS. The issue is classified under CVSS v3.1 with a score of 6.5 (medium severity), indicating a network attack vector with low attack complexity, no privileges required, but requiring user interaction (such as visiting a malicious website). The impact is limited to availability, causing denial of service by crashing the Safari process, without compromising confidentiality or integrity. Apple has fixed this vulnerability by improving bounds checking in the affected components. No known exploits have been reported in the wild, but the vulnerability could be leveraged by attackers to disrupt user browsing sessions or potentially cause denial of service on Apple devices. The vulnerability is relevant to all users of the affected Apple platforms and Safari versions prior to the patched releases.
Potential Impact
The primary impact of CVE-2024-40789 is denial of service through unexpected process crashes in Safari when processing malicious web content. For organizations, this can lead to disruption of web-based workflows, reduced productivity, and potential user frustration. While the vulnerability does not allow data theft or code execution, repeated crashes could be exploited to degrade service availability or as part of a broader attack strategy to distract or disrupt users. Enterprises relying heavily on Apple devices and Safari for critical operations may experience operational interruptions. Additionally, environments with shared devices or kiosks could be vulnerable to persistent denial of service if users are directed to malicious content. Since no authentication or elevated privileges are required, and the attack vector is remote via web browsing, the scope of affected systems is broad among Apple users. However, the lack of known exploits and the medium severity rating suggest the threat is moderate but should not be ignored.
Mitigation Recommendations
Organizations and users should promptly update all affected Apple devices and Safari browsers to the patched versions: Safari 17.6, iOS 16.7.9 and 17.6, iPadOS 16.7.9 and 17.6, macOS Sonoma 14.6, tvOS 17.6, visionOS 1.3, and watchOS 10.6. Beyond patching, administrators should consider implementing network-level protections such as web filtering to block access to suspicious or untrusted websites that could host malicious content. Employing endpoint security solutions that monitor for abnormal browser crashes or unusual network activity can help detect exploitation attempts. User education is important to reduce the risk of visiting untrusted links or websites. For managed environments, restricting Safari usage or deploying alternative browsers temporarily until patching is complete may reduce exposure. Monitoring Apple security advisories for updates or emerging exploit reports is also recommended. Finally, ensure that incident response plans include procedures for handling denial-of-service incidents caused by browser crashes.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, China, India, Brazil
CVE-2024-40789: Processing maliciously crafted web content may lead to an unexpected process crash in Apple Safari
Description
An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in Safari 17.6, iOS 16.7.9 and iPadOS 16.7.9, iOS 17.6 and iPadOS 17.6, macOS Sonoma 14.6, tvOS 17.6, visionOS 1.3, watchOS 10.6. Processing maliciously crafted web content may lead to an unexpected process crash.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-40789 is a vulnerability identified in Apple Safari and related Apple operating systems, caused by an out-of-bounds access error (CWE-125). This flaw arises from inadequate bounds checking when processing certain web content, which can be maliciously crafted to trigger an unexpected process crash. The vulnerability affects Safari 17.6 and multiple Apple OS versions including iOS, iPadOS, macOS Sonoma, tvOS, visionOS, and watchOS. The issue is classified under CVSS v3.1 with a score of 6.5 (medium severity), indicating a network attack vector with low attack complexity, no privileges required, but requiring user interaction (such as visiting a malicious website). The impact is limited to availability, causing denial of service by crashing the Safari process, without compromising confidentiality or integrity. Apple has fixed this vulnerability by improving bounds checking in the affected components. No known exploits have been reported in the wild, but the vulnerability could be leveraged by attackers to disrupt user browsing sessions or potentially cause denial of service on Apple devices. The vulnerability is relevant to all users of the affected Apple platforms and Safari versions prior to the patched releases.
Potential Impact
The primary impact of CVE-2024-40789 is denial of service through unexpected process crashes in Safari when processing malicious web content. For organizations, this can lead to disruption of web-based workflows, reduced productivity, and potential user frustration. While the vulnerability does not allow data theft or code execution, repeated crashes could be exploited to degrade service availability or as part of a broader attack strategy to distract or disrupt users. Enterprises relying heavily on Apple devices and Safari for critical operations may experience operational interruptions. Additionally, environments with shared devices or kiosks could be vulnerable to persistent denial of service if users are directed to malicious content. Since no authentication or elevated privileges are required, and the attack vector is remote via web browsing, the scope of affected systems is broad among Apple users. However, the lack of known exploits and the medium severity rating suggest the threat is moderate but should not be ignored.
Mitigation Recommendations
Organizations and users should promptly update all affected Apple devices and Safari browsers to the patched versions: Safari 17.6, iOS 16.7.9 and 17.6, iPadOS 16.7.9 and 17.6, macOS Sonoma 14.6, tvOS 17.6, visionOS 1.3, and watchOS 10.6. Beyond patching, administrators should consider implementing network-level protections such as web filtering to block access to suspicious or untrusted websites that could host malicious content. Employing endpoint security solutions that monitor for abnormal browser crashes or unusual network activity can help detect exploitation attempts. User education is important to reduce the risk of visiting untrusted links or websites. For managed environments, restricting Safari usage or deploying alternative browsers temporarily until patching is complete may reduce exposure. Monitoring Apple security advisories for updates or emerging exploit reports is also recommended. Finally, ensure that incident response plans include procedures for handling denial-of-service incidents caused by browser crashes.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apple
- Date Reserved
- 2024-07-10T17:11:04.689Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a2df0f0ba78a0505373d7
Added to database: 11/4/2025, 4:46:40 PM
Last enriched: 4/2/2026, 11:26:07 PM
Last updated: 5/9/2026, 8:27:50 AM
Views: 45
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.