- Vulnerable U
- Posts
- Two Apple Flaws Used in Attacks on Intel-Based Macs
Two Apple Flaws Used in Attacks on Intel-Based Macs
Apple has rushed out emergency patches for two zero-day flaws in Macs, iPhones and iPads.
Apple on Tuesday hurried out emergency updates for two vulnerabilities (CVE-2024-44308 and CVE-2024-44309) that have been exploited on Intel-based Macs. The flaws impact various versions of Macs, iPhones and iPads.
Key Details:
One flaw (CVE-2024-44308) exists in JavaScriptCore, which is the JavaScript engine for WebKit
If the flaw is successfully exploited via processing maliciously crafted web content, it could allow arbitrary code execution. Apple said it fixed the flaw with improved checks
A second flaw (CVE-2024-44309) exists in WebKit, the web browser engine developed by Apple and used by Safari, Mail, App Store, and many other apps
The flaw is described as a cookie management issue where the processing of maliciously crafted web content could allow a cross-site scripting attack. Apple said it has been fixed with improved state management
Vendor Reaction: For both flaws, “Apple is aware of a report that this issue may have been actively exploited on Intel-based Mac systems,” according to its advisories. Apple released the following security updates that address these flaws: macOS Sequoia 15.1.1, iOS 18.1.1 and iPadOS 18.1.1, iOS 17.7.2 and iPadOS 17.7.2, visionOS 2.1.1 and Safari 18.1.1.
Why It Matters: Apple didn’t disclose further details of the exploitation activity, but the vulnerabilities were discovered by Clément Lecigne and Benoît Sevens of Google's Threat Analysis Group, a team that is known for tracking advanced persistent threat groups, targeted surveillance campaigns and more. The fact that one of the flaws exists in Webkit - which has been previously targeted by attackers - and that the vulnerabilities have already been used in attacks are indications that users should update their Macs, iPhones and iPads as soon as they can.