Apple fixed his first actively exploited zero-day CVE-2024-23222

CVE-2024-23222 is a critical security vulnerability impacting Apple devices utilizing Webkit, Safari’s web rendering engine. This vulnerability involves a type confusion error that could be exploited by an attacker to execute arbitrary code when processing malicious web content. Apple addressed the issue with enhanced checks, ensuring a resolution to the vulnerability.

On January 22, 2024, Apple released patches for iOS, iPadOS, macOS, tvOS, and Safari in response to CVE-2024-23222. The company noted awareness of a report suggesting potential exploitation of this issue. We strongly advise users to promptly update their devices to safeguard against potential attacks.

What is WebKit?

WebKit is an open-source web browser engine that enables browsers to render web pages, execute JavaScript code, and display content. Originally derived as a fork from KHTML, the KDE browser engine, in 2001, WebKit was developed by Apple for its Safari browser. Other popular browsers like Chrome, Opera, and Edge have embraced WebKit over time.

WebKit- CVE-2024-23222
WebKit- CVE-2024-23222

Comprising various components like WebCore, JavaScriptCore, Web Inspector, and WebKit2, WebKit offers a comprehensive web browsing experience. WebCore is responsible for processing HTML, CSS, and SVG. JavaScriptCore serves as the JavaScript engine interpreting and executing code written in this language. Web Inspector acts as a development tool, facilitating the inspection and debugging of web pages. WebKit2 introduces an architecture that separates the user interface process from the rendering process, enhancing both security and performance.

Can I avoid this vulnerability by disabling JavaScript in Safari?

No, disabling JavaScript in Safari is not an effective solution to prevent this vulnerability. JavaScript is a programming language that enables dynamic and interactive web pages but can also be exploited by attackers to target browser security flaws. However, CVE-2024-23222 is a type confusion error occurring in Safari’s web rendering engine, called WebKit, responsible for processing web content. Therefore, disabling JavaScript would not prevent an attacker from executing arbitrary code when visiting a malicious webpage.

The only way to shield against this vulnerability is to update Apple devices to the latest available versions, which include security patches addressing the issue. Protect your devices by ensuring they are running the latest updates with enhanced security measures.

Apple devices impacted by CVE-2024-23222

CVE-2024-23222 is a vulnerability that affects Apple devices using Webkit, Safari’s web rendering engine. According to Apple, the impacted devices include:

  • iPhone 6s and later
  • All generations of iPad Pro
  • iPad Air 2 and later
  • 5th generation iPad and later
  • iPad mini 4 and later
  • 7th generation iPod touch
  • Apple Watch Series 3 and later
  • Apple TV 4K and Apple TV HD
  • Mac with macOS Catalina 10.15.7, macOS Big Sur 11.6.2, or macOS Monterey 12.1

Apple recommends users to update their devices as soon as possible to protect themselves from potential attacks. For more information visit the official Apple’s website.

How to avoid being impacted by CVE-2024-23222

The Apple version that addresses the CVE-2024-23222 vulnerability depends on the type of device you have. According to Apple search results, these are the versions you should install to ensure protection:

  • iOS 17.3 and iPadOS 17.3
  • macOS Catalina 10.15.7, macOS Big Sur 11.6.2, or macOS Monterey 12.1
  • tvOS 14.7
  • watchOS 7.6
  • Safari 14.1.2

For more information on the security content of these updates, you can refer to the manufacturer’s advisories.

Stay protected and keep your devices secure by applying the latest updates. Your security is our priority.

Vulnerabilities section

Related Posts