Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-44309: Processing maliciously crafted web content may lead to a cross site scripting attack. Apple is aware of a report that this issue may have been actively exploited on Intel-based Mac systems. in Apple Safari

0
Medium
VulnerabilityCVE-2024-44309cvecve-2024-44309
Published: Tue Nov 19 2024 (11/19/2024, 23:43:55 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: Safari

Description

A cookie management issue was addressed with improved state management. This issue is fixed in Safari 18.1.1, iOS 17.7.2 and iPadOS 17.7.2, macOS Sequoia 15.1.1, iOS 18.1.1 and iPadOS 18.1.1, visionOS 2.1.1. Processing maliciously crafted web content may lead to a cross site scripting attack. Apple is aware of a report that this issue may have been actively exploited on Intel-based Mac systems.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 06:34:46 UTC

Technical Analysis

CVE-2024-44309 is a cross-site scripting (XSS) vulnerability identified in Apple Safari, stemming from a cookie management issue related to state management. When Safari processes maliciously crafted web content, it may improperly handle cookies or state information, enabling an attacker to inject and execute arbitrary JavaScript code within the context of the victim’s browser session. This vulnerability affects multiple Apple platforms, including Safari 18.1.1, iOS 17.7.2 and 18.1.1, iPadOS 17.7.2 and 18.1.1, macOS Sequoia 15.1.1, and visionOS 2.1.1. Apple has acknowledged reports of active exploitation on Intel-based Mac systems, indicating real-world targeting. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation), a common vector for XSS attacks. The CVSS v3.1 base score is 6.3, with metrics indicating network attack vector, low attack complexity, no privileges required, user interaction needed, and impacts on confidentiality, integrity, and availability. The flaw allows attackers to bypass same-origin policies, potentially stealing session tokens, manipulating web content, or performing actions on behalf of the user. The issue is mitigated by improved state and cookie management in the updated software versions.

Potential Impact

The exploitation of CVE-2024-44309 can lead to unauthorized script execution within the context of the Safari browser, potentially allowing attackers to steal sensitive information such as session cookies, perform actions on behalf of the user, or manipulate displayed content. This can compromise user confidentiality and integrity, and in some cases availability if malicious scripts disrupt browser functionality. Organizations relying on Apple devices, particularly those with Intel-based Macs, face risks of targeted attacks that could lead to data breaches or unauthorized access to internal systems via compromised user sessions. The impact is heightened in environments where Safari is used to access sensitive web applications or internal portals. Although the vulnerability requires user interaction, the widespread use of Safari across consumer and enterprise sectors increases the attack surface. Failure to patch could result in exploitation campaigns, especially in sectors with high-value targets such as finance, government, and technology.

Mitigation Recommendations

Organizations and users should immediately update affected Apple platforms to the patched versions: Safari 18.1.1, iOS 17.7.2/18.1.1, iPadOS 17.7.2/18.1.1, macOS Sequoia 15.1.1, and visionOS 2.1.1. Beyond patching, administrators should enforce strict Content Security Policies (CSP) on web applications accessed via Safari to limit script execution sources. Employing browser isolation or sandboxing technologies can reduce the impact of potential XSS attacks. Security teams should monitor web traffic for suspicious payloads and educate users about the risks of interacting with untrusted web content. Implementing multi-factor authentication (MFA) can mitigate session hijacking risks resulting from stolen cookies. Regularly auditing and updating web applications to sanitize inputs and outputs reduces the likelihood of successful XSS exploitation. Finally, organizations should maintain up-to-date endpoint detection and response (EDR) solutions capable of detecting anomalous browser behaviors indicative of exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
apple
Date Reserved
2024-08-20T21:45:40.801Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9b5247d717aace26b45

Added to database: 10/21/2025, 7:06:29 PM

Last enriched: 2/28/2026, 6:34:46 AM

Last updated: 3/26/2026, 7:13:41 AM

Views: 100

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses