Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-40789: Processing maliciously crafted web content may lead to an unexpected process crash in Apple Safari

0
Medium
VulnerabilityCVE-2024-40789cvecve-2024-40789
Published: Mon Jul 29 2024 (07/29/2024, 22:16:57 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: Safari

Description

An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in Safari 17.6, iOS 16.7.9 and iPadOS 16.7.9, iOS 17.6 and iPadOS 17.6, macOS Sonoma 14.6, tvOS 17.6, visionOS 1.3, watchOS 10.6. Processing maliciously crafted web content may lead to an unexpected process crash.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 23:26:07 UTC

Technical Analysis

CVE-2024-40789 is a vulnerability identified in Apple Safari and related Apple operating systems, caused by an out-of-bounds access error (CWE-125). This flaw arises from inadequate bounds checking when processing certain web content, which can be maliciously crafted to trigger an unexpected process crash. The vulnerability affects Safari 17.6 and multiple Apple OS versions including iOS, iPadOS, macOS Sonoma, tvOS, visionOS, and watchOS. The issue is classified under CVSS v3.1 with a score of 6.5 (medium severity), indicating a network attack vector with low attack complexity, no privileges required, but requiring user interaction (such as visiting a malicious website). The impact is limited to availability, causing denial of service by crashing the Safari process, without compromising confidentiality or integrity. Apple has fixed this vulnerability by improving bounds checking in the affected components. No known exploits have been reported in the wild, but the vulnerability could be leveraged by attackers to disrupt user browsing sessions or potentially cause denial of service on Apple devices. The vulnerability is relevant to all users of the affected Apple platforms and Safari versions prior to the patched releases.

Potential Impact

The primary impact of CVE-2024-40789 is denial of service through unexpected process crashes in Safari when processing malicious web content. For organizations, this can lead to disruption of web-based workflows, reduced productivity, and potential user frustration. While the vulnerability does not allow data theft or code execution, repeated crashes could be exploited to degrade service availability or as part of a broader attack strategy to distract or disrupt users. Enterprises relying heavily on Apple devices and Safari for critical operations may experience operational interruptions. Additionally, environments with shared devices or kiosks could be vulnerable to persistent denial of service if users are directed to malicious content. Since no authentication or elevated privileges are required, and the attack vector is remote via web browsing, the scope of affected systems is broad among Apple users. However, the lack of known exploits and the medium severity rating suggest the threat is moderate but should not be ignored.

Mitigation Recommendations

Organizations and users should promptly update all affected Apple devices and Safari browsers to the patched versions: Safari 17.6, iOS 16.7.9 and 17.6, iPadOS 16.7.9 and 17.6, macOS Sonoma 14.6, tvOS 17.6, visionOS 1.3, and watchOS 10.6. Beyond patching, administrators should consider implementing network-level protections such as web filtering to block access to suspicious or untrusted websites that could host malicious content. Employing endpoint security solutions that monitor for abnormal browser crashes or unusual network activity can help detect exploitation attempts. User education is important to reduce the risk of visiting untrusted links or websites. For managed environments, restricting Safari usage or deploying alternative browsers temporarily until patching is complete may reduce exposure. Monitoring Apple security advisories for updates or emerging exploit reports is also recommended. Finally, ensure that incident response plans include procedures for handling denial-of-service incidents caused by browser crashes.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2024-07-10T17:11:04.689Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a2df0f0ba78a0505373d7

Added to database: 11/4/2025, 4:46:40 PM

Last enriched: 4/2/2026, 11:26:07 PM

Last updated: 5/9/2026, 8:27:50 AM

Views: 45

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses