Search for vulnerabilities
Vulnerability details: VCID-f1j1-6rf1-hyd7
Vulnerability ID VCID-f1j1-6rf1-hyd7
Aliases CVE-2024-44192
Summary The issue was addressed with improved checks. This issue is fixed in watchOS 11, macOS Sequoia 15, Safari 18, visionOS 2, iOS 18 and iPadOS 18, tvOS 18. Processing maliciously crafted web content may lead to an unexpected process crash.
Status Published
Exploitability 0.5
Weighted Severity 7.9
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3 8.8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44192.json
epss 0.00056 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00056 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00056 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00056 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00056 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00056 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00056 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00056 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00064 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00064 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
epss 0.00064 https://api.first.org/data/v1/epss?cve=CVE-2024-44192
cvssv3.1 6.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 5.5 https://nvd.nist.gov/vuln/detail/CVE-2024-44192
cvssv3.1 6.5 https://support.apple.com/en-us/121238
ssvc Track https://support.apple.com/en-us/121238
cvssv3.1 6.5 https://support.apple.com/en-us/121240
ssvc Track https://support.apple.com/en-us/121240
cvssv3.1 6.5 https://support.apple.com/en-us/121241
ssvc Track https://support.apple.com/en-us/121241
cvssv3.1 6.5 https://support.apple.com/en-us/121248
ssvc Track https://support.apple.com/en-us/121248
cvssv3.1 6.5 https://support.apple.com/en-us/121249
ssvc Track https://support.apple.com/en-us/121249
cvssv3.1 6.5 https://support.apple.com/en-us/121250
ssvc Track https://support.apple.com/en-us/121250
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44192.json
https://api.first.org/data/v1/epss?cve=CVE-2024-44192
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44192
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
121238 https://support.apple.com/en-us/121238
121240 https://support.apple.com/en-us/121240
121241 https://support.apple.com/en-us/121241
121248 https://support.apple.com/en-us/121248
121249 https://support.apple.com/en-us/121249
121250 https://support.apple.com/en-us/121250
2353871 https://bugzilla.redhat.com/show_bug.cgi?id=2353871
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
CVE-2024-44192 https://nvd.nist.gov/vuln/detail/CVE-2024-44192
RHSA-2025:10364 https://access.redhat.com/errata/RHSA-2025:10364
RHSA-2025:3713 https://access.redhat.com/errata/RHSA-2025:3713
RHSA-2025:3755 https://access.redhat.com/errata/RHSA-2025:3755
RHSA-2025:3756 https://access.redhat.com/errata/RHSA-2025:3756
RHSA-2025:3974 https://access.redhat.com/errata/RHSA-2025:3974
RHSA-2025:4445 https://access.redhat.com/errata/RHSA-2025:4445
RHSA-2025:7387 https://access.redhat.com/errata/RHSA-2025:7387
RHSA-2025:7998 https://access.redhat.com/errata/RHSA-2025:7998
RHSA-2025:8064 https://access.redhat.com/errata/RHSA-2025:8064
RHSA-2025:8065 https://access.redhat.com/errata/RHSA-2025:8065
RHSA-2025:8066 https://access.redhat.com/errata/RHSA-2025:8066
RHSA-2025:8194 https://access.redhat.com/errata/RHSA-2025:8194
USN-7395-1 https://usn.ubuntu.com/7395-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44192.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2024-44192
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://support.apple.com/en-us/121238
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/ Found at https://support.apple.com/en-us/121238
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://support.apple.com/en-us/121240
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/ Found at https://support.apple.com/en-us/121240
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://support.apple.com/en-us/121241
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/ Found at https://support.apple.com/en-us/121241
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://support.apple.com/en-us/121248
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/ Found at https://support.apple.com/en-us/121248
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://support.apple.com/en-us/121249
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/ Found at https://support.apple.com/en-us/121249
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://support.apple.com/en-us/121250
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/ Found at https://support.apple.com/en-us/121250
Exploit Prediction Scoring System (EPSS)
Percentile 0.176
EPSS Score 0.00056
Published At July 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:51:18.965019+00:00 Ubuntu USN Importer Import https://usn.ubuntu.com/7395-1/ 37.0.0