CVE-2024-44309
Summary
| CVE | CVE-2024-44309 |
|---|---|
| State | PUBLISHED |
| Assigner | apple |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2024-11-20 00:15:17 UTC |
| Updated | 2026-04-02 19:18:39 UTC |
| Description | A cookie management issue was addressed with improved state management. This issue is fixed in Safari 18.1.1, iOS 17.7.2 and iPadOS 17.7.2, iOS 18.1.1 and iPadOS 18.1.1, macOS Sequoia 15.1.1, visionOS 2.1.1. Processing maliciously crafted web content may lead to a cross site scripting attack. Apple is aware of a report that this issue may have been actively exploited on Intel-based Mac systems. |
Risk And Classification
Primary CVSS: v3.1 6.1 MEDIUM from [email protected]
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
EPSS: 0.013090000 probability, percentile 0.798200000 (date 2026-04-21)
CISA KEV: Listed on 2024-11-21; due 2024-12-12; ransomware use Unknown
Problem Types: CWE-79 | Processing maliciously crafted web content may lead to a cross site scripting attack. Apple is aware of a report that this issue may have been actively exploited on Intel-based Mac systems. | CWE-79 CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Primary | 6.1 | MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
| 3.1 | ADP | DECLARED | 6.3 | MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L |
| 3.1 | 134c704f-9b21-4f2e-91b3-4a467353bcc0 | Secondary | 6.3 | MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L |
CVSS v3.1 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
NoneUser Interaction
RequiredScope
ChangedConfidentiality
LowIntegrity
LowAvailability
NoneCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CISA Known Exploited Vulnerability
| Vendor | Apple |
|---|---|
| Product | Multiple Products |
| Name | Apple Multiple Products Cross-Site Scripting (XSS) Vulnerability |
| Required Action | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. |
| Notes | https://support.apple.com/en-us/121752, https://support.apple.com/en-us/121753, https://support.apple.com/en-us/121754, https://support.apple.com/en-us/121755, https://support.apple.com/en-us/121756 ; https://nvd.nist.gov/vuln/detail/CVE-2024-44309 |
NVD Known Affected Configurations (CPE 2.3)
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Apple | Safari | affected 18.1.1 custom | Not specified |
| CNA | Apple | IOS And IPadOS | affected 17.7.2 custom | Not specified |
| CNA | Apple | IOS And IPadOS | affected 18.1.1 custom | Not specified |
| CNA | Apple | MacOS | affected 15.1.1 custom | Not specified |
| CNA | Apple | VisionOS | affected 2.1.1 custom | Not specified |
| ADP | Apple | Safari | affected 18.1 custom | Not specified |
| ADP | Apple | Macos | affected 15.1 custom | Not specified |
| ADP | Apple | Visionos | affected 2.1 custom | Not specified |
| ADP | Apple | Iphone Os | affected 17.7 custom | Not specified |
| ADP | Apple | Iphone Os | affected 18.0 18.1 custom | Not specified |
| ADP | Apple | Iphone Os | affected 17.7 custom | Not specified |
| ADP | Apple | Iphone Os | affected 18.0 18.1 custom | Not specified |
| ADP | Apple | Ipad Os | affected 17.7 custom | Not specified |
| ADP | Apple | Ipad Os | affected 18.0 18.1 custom | Not specified |
| ADP | Apple | Ipad Os | affected 17.7 custom | Not specified |
| ADP | Apple | Ipad Os | affected 18.0 18.1 custom | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| support.apple.com/en-us/121756 | [email protected] | support.apple.com | Vendor Advisory |
| www.cisa.gov/known-exploited-vulnerabilities-catalog | 134c704f-9b21-4f2e-91b3-4a467353bcc0 | www.cisa.gov | US Government Resource |
| seclists.org/fulldisclosure/2024/Nov/16 | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | Mailing List, Third Party Advisory |
| support.apple.com/en-us/121754 | [email protected] | support.apple.com | Vendor Advisory |
| support.apple.com/en-us/121752 | [email protected] | support.apple.com | Vendor Advisory |
| support.apple.com/en-us/121753 | [email protected] | support.apple.com | Vendor Advisory |
| lists.debian.org/debian-lts-announce/2024/12/msg00003.html | af854a3a-2127-422b-91ae-364da2661108 | lists.debian.org | Mailing List |
| support.apple.com/en-us/121755 | [email protected] | support.apple.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
| CISA Known Exploited Vulnerabilities catalog | CISA | www.cisa.gov | kev |
No vendor comments have been submitted for this CVE.
Additional Advisory Data
| Source | Time | Event |
|---|---|---|
| ADP | 2024-11-21T00:00:00.000Z | CVE-2024-44309 added to CISA KEV |
There are currently no legacy QID mappings associated with this CVE.