Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-40857: Processing maliciously crafted web content may lead to universal cross site scripting in Apple Safari

0
Medium
VulnerabilityCVE-2024-40857cvecve-2024-40857
Published: Mon Sep 16 2024 (09/16/2024, 23:22:32 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: Safari

Description

This issue was addressed through improved state management. This issue is fixed in Safari 18, iOS 18 and iPadOS 18, macOS Sequoia 15, tvOS 18, visionOS 2, watchOS 11. Processing maliciously crafted web content may lead to universal cross site scripting.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 23:40:06 UTC

Technical Analysis

CVE-2024-40857 is a vulnerability classified under CWE-79 (Improper Neutralization of Input During Web Page Generation, commonly known as Cross-Site Scripting) affecting Apple Safari browser across multiple Apple operating systems. The root cause is improper state management when processing web content, which allows an attacker to craft malicious web pages that can execute arbitrary JavaScript in the security context of the victim’s browser. This universal cross-site scripting (UXSS) vulnerability can bypass same-origin policy protections, enabling attackers to steal sensitive information such as cookies, session tokens, or perform actions on behalf of the user without their consent. The vulnerability is exploitable remotely over the network without requiring any privileges or authentication, but it does require user interaction, such as visiting a malicious website or clicking a crafted link. The CVSS v3.1 base score is 6.1, reflecting medium severity, with vector AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N indicating network attack vector, low attack complexity, no privileges required, user interaction required, scope changed, and limited confidentiality and integrity impact but no availability impact. Apple fixed this issue by improving state management in Safari 18 and corresponding OS updates including iOS 18, iPadOS 18, macOS Sequoia 15, tvOS 18, visionOS 2, and watchOS 11. No public exploits have been reported yet, but the vulnerability’s nature makes it a significant risk for phishing and drive-by download attacks targeting Apple users.

Potential Impact

The primary impact of CVE-2024-40857 is on the confidentiality and integrity of user data accessed through Safari on Apple devices. Successful exploitation allows attackers to execute arbitrary scripts in the context of trusted websites, potentially leading to theft of cookies, session tokens, or other sensitive information. This can facilitate account takeover, unauthorized actions on web applications, and further malware delivery. Since Safari is the default browser on Apple platforms, a large user base is exposed, including consumers, enterprises, and government users. The vulnerability’s universal XSS nature means it can bypass same-origin policy protections, increasing the risk of widespread exploitation. Although no availability impact is noted, the breach of confidentiality and integrity can have severe consequences such as data leakage, fraud, and reputational damage. Organizations with Apple device fleets, especially those handling sensitive or regulated data, face increased risk if patches are not applied promptly. The requirement for user interaction means social engineering or phishing campaigns could be used to trigger the exploit.

Mitigation Recommendations

To mitigate CVE-2024-40857, organizations and users should immediately update Safari to version 18 or later and ensure all Apple devices are running the latest OS versions: iOS 18, iPadOS 18, macOS Sequoia 15, tvOS 18, visionOS 2, and watchOS 11. Beyond patching, organizations should implement strict web content filtering and URL reputation services to block access to known malicious sites. Employing browser security features such as Content Security Policy (CSP) can help limit the impact of XSS attacks by restricting script execution sources. User education on phishing and suspicious links is critical since exploitation requires user interaction. Network-level protections like DNS filtering and intrusion detection systems tuned for web-based attacks can provide additional defense layers. For enterprise environments, consider deploying endpoint protection solutions that monitor browser behavior for anomalies. Regularly audit and monitor logs for unusual web activity or script execution patterns. Finally, encourage users to use multi-factor authentication on sensitive web services to reduce the impact of session hijacking attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2024-07-10T17:11:04.711Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a2df4f0ba78a05053762e

Added to database: 11/4/2025, 4:46:44 PM

Last enriched: 4/2/2026, 11:40:06 PM

Last updated: 5/9/2026, 8:33:32 AM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses