Apple Urgently Patches Actively Exploited Zero-DaysApple Urgently Patches Actively Exploited Zero-Days
Though information regarding the exploits is limited, the company did report that Intel-based Mac systems have been targeted by cybercriminals looking to exploit CVE-2024-44308 and CVE-2024-44309.
![Flat layout of different Apple products on a gray background Flat layout of different Apple products on a gray background](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt2e56e93bc33328eb/673dfcabf449ceea396c9e78/apple1800_Shahid_Jamil_alamy.jpg?width=1280&auto=webp&quality=95&format=jpg&disable=upscale)
Apple has released security updates to address two zero-day vulnerabilities that are under active exploitation in the wild.
The bugs, tracked as CVE-2024-44308 (CVSS 6.8) and CVE-2024-44309 (CVSS 4.3), are, respectively, a vulnerability in JavaScriptCore that could lead to arbitrary code execution; and a cookie management vulnerability in WebKit that could lead to a cross-site scripting (XSS) attack while processing malicious Web content.
The bugs affect Apple's iOS, iPadOS, macOS, visionOS, and the Safari Web browser; the company reports that it has addressed them with better checks and improved state management.
Clément Lecigne and Benoît Sevens at Google's Threat Analysis Group (TAG) first discovered and reported the vulnerabilities and, as is customary for the company, Apple did not provide any additional details of reported attacks nor did it offer indicators of compromise (IoCs).
"Apple is aware of a report that this issue may have been actively exploited on Intel-based Mac systems," Apple stated its advisory for both zero-days, the lone piece of information regarding in-the-wild exploitation attempts.
Those using affected Apple ecosystem products should update to iOS 18.1.1, macOS Sequoia 15.1.1, and iOS 17.7.2 as soon as possible to avoid compromise.
About the Author
You May Also Like
Uncovering Threats to Your Mainframe & How to Keep Host Access Secure
Feb 13, 2025Securing the Remote Workforce
Feb 20, 2025Emerging Technologies and Their Impact on CISO Strategies
Feb 25, 2025How CISOs Navigate the Regulatory and Compliance Maze
Feb 26, 2025Where Does Outsourcing Make Sense for Your Organization?
Feb 27, 2025