CVE-2024-54543
Published: 27 January 2025
Summary
CVE-2024-54543 is a high-severity Out-of-bounds Write (CWE-787) vulnerability in Apple Safari. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Drive-by Compromise (T1189); ranked at the 34.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly protects system memory from corruption and unauthorized code execution caused by processing maliciously crafted web content.
Ensures timely patching of the specific memory corruption flaw addressed in Safari 18.2 and related OS updates.
Validates and sanitizes web content inputs to mitigate malformed data triggering memory corruption during browser processing.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Memory corruption in Safari triggered by malicious web content directly enables drive-by compromise and client-side exploitation for code execution.
NVD Description
The issue was addressed with improved memory handling. This issue is fixed in Safari 18.2, iOS 18.2 and iPadOS 18.2, iPadOS 17.7.6, macOS Sequoia 15.2, tvOS 18.2, visionOS 2.2, watchOS 11.2. Processing maliciously crafted web content may lead to memory…
more
corruption.
Deeper analysisAI
CVE-2024-54543 is a memory corruption vulnerability (CWE-787) addressed through improved memory handling in Apple Safari and associated operating systems. It affects versions of Safari prior to 18.2, iOS prior to 18.2 and iPadOS prior to 18.2 or 17.7.6, macOS Sequoia prior to 15.2, tvOS prior to 18.2, visionOS prior to 2.2, and watchOS prior to 11.2. The flaw is triggered by processing maliciously crafted web content, which can lead to memory corruption.
The vulnerability carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), indicating high severity with network accessibility, low attack complexity, no required privileges, and user interaction needed. Remote attackers can exploit it by tricking users into loading malicious web content, such as via a phishing link or compromised website. Successful exploitation may result in high-impact confidentiality, integrity, and availability violations, potentially enabling arbitrary code execution within the browser's sandbox.
Apple's security advisories, detailed at https://support.apple.com/en-us/121837, https://support.apple.com/en-us/121839, https://support.apple.com/en-us/121843, https://support.apple.com/en-us/121844, and https://support.apple.com/en-us/121845, confirm the issue was resolved in the specified versions. Mitigation requires updating affected devices to these patched releases as soon as possible.
Details
- CWE(s)