Search for vulnerabilities
Vulnerability details: VCID-pr7k-su8x-73a9
Vulnerability ID VCID-pr7k-su8x-73a9
Aliases CVE-2024-44308
Summary The issue was addressed with improved checks. This issue is fixed in Safari 18.1.1, iOS 17.7.2 and iPadOS 17.7.2, macOS Sequoia 15.1.1, iOS 18.1.1 and iPadOS 18.1.1, visionOS 2.1.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited on Intel-based Mac systems.
Status Published
Exploitability 2.0
Weighted Severity 7.9
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
System Score Found at
cvssv3 8.8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44308.json
epss 0.00334 https://api.first.org/data/v1/epss?cve=CVE-2024-44308
epss 0.00334 https://api.first.org/data/v1/epss?cve=CVE-2024-44308
epss 0.00334 https://api.first.org/data/v1/epss?cve=CVE-2024-44308
epss 0.00334 https://api.first.org/data/v1/epss?cve=CVE-2024-44308
epss 0.00334 https://api.first.org/data/v1/epss?cve=CVE-2024-44308
epss 0.00334 https://api.first.org/data/v1/epss?cve=CVE-2024-44308
epss 0.00334 https://api.first.org/data/v1/epss?cve=CVE-2024-44308
epss 0.00334 https://api.first.org/data/v1/epss?cve=CVE-2024-44308
epss 0.00334 https://api.first.org/data/v1/epss?cve=CVE-2024-44308
epss 0.00334 https://api.first.org/data/v1/epss?cve=CVE-2024-44308
epss 0.00334 https://api.first.org/data/v1/epss?cve=CVE-2024-44308
epss 0.00334 https://api.first.org/data/v1/epss?cve=CVE-2024-44308
epss 0.00334 https://api.first.org/data/v1/epss?cve=CVE-2024-44308
epss 0.00334 https://api.first.org/data/v1/epss?cve=CVE-2024-44308
epss 0.00334 https://api.first.org/data/v1/epss?cve=CVE-2024-44308
epss 0.00334 https://api.first.org/data/v1/epss?cve=CVE-2024-44308
epss 0.00334 https://api.first.org/data/v1/epss?cve=CVE-2024-44308
epss 0.00334 https://api.first.org/data/v1/epss?cve=CVE-2024-44308
epss 0.00334 https://api.first.org/data/v1/epss?cve=CVE-2024-44308
cvssv3.1 8.8 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 8.8 https://nvd.nist.gov/vuln/detail/CVE-2024-44308
cvssv3.1 8.8 https://support.apple.com/en-us/121752
ssvc Attend https://support.apple.com/en-us/121752
cvssv3.1 8.8 https://support.apple.com/en-us/121753
ssvc Attend https://support.apple.com/en-us/121753
cvssv3.1 8.8 https://support.apple.com/en-us/121754
ssvc Attend https://support.apple.com/en-us/121754
cvssv3.1 8.8 https://support.apple.com/en-us/121755
ssvc Attend https://support.apple.com/en-us/121755
cvssv3.1 8.8 https://support.apple.com/en-us/121756
ssvc Attend https://support.apple.com/en-us/121756
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44308.json
https://api.first.org/data/v1/epss?cve=CVE-2024-44308
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44308
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
121752 https://support.apple.com/en-us/121752
121753 https://support.apple.com/en-us/121753
121754 https://support.apple.com/en-us/121754
121755 https://support.apple.com/en-us/121755
121756 https://support.apple.com/en-us/121756
2327931 https://bugzilla.redhat.com/show_bug.cgi?id=2327931
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
CVE-2024-44308 https://nvd.nist.gov/vuln/detail/CVE-2024-44308
RHSA-2025:10364 https://access.redhat.com/errata/RHSA-2025:10364
USN-7142-1 https://usn.ubuntu.com/7142-1/
Data source KEV
Date added Nov. 21, 2024
Description Apple iOS, macOS, and other Apple products contain an unspecified vulnerability when processing maliciously crafted web content that may lead to arbitrary code execution.
Required action Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Due date Dec. 12, 2024
Note
https://support.apple.com/en-us/121752, https://support.apple.com/en-us/121753, https://support.apple.com/en-us/121754, https://support.apple.com/en-us/121755, https://support.apple.com/en-us/121756 ; https://nvd.nist.gov/vuln/detail/CVE-2024-44308
Ransomware campaign use Unknown
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44308.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2024-44308
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/121752
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-11-23T04:55:46Z/ Found at https://support.apple.com/en-us/121752
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/121753
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-11-23T04:55:46Z/ Found at https://support.apple.com/en-us/121753
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/121754
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-11-23T04:55:46Z/ Found at https://support.apple.com/en-us/121754
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/121755
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-11-23T04:55:46Z/ Found at https://support.apple.com/en-us/121755
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://support.apple.com/en-us/121756
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-11-23T04:55:46Z/ Found at https://support.apple.com/en-us/121756
Exploit Prediction Scoring System (EPSS)
Percentile 0.55618
EPSS Score 0.00334
Published At July 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:47:37.906365+00:00 Ubuntu USN Importer Import https://usn.ubuntu.com/7142-1/ 37.0.0