CVE-2024-23222

ENISA EUVD: EUVD-2024-20741 ↗
Exploited in the Wild ✓ Confirmed 0-Day ★ Google Project Zero
Triaged: March 3, 2026 8 articles Published: 2024-01-23

EPSS Score

Source: FIRST.org · 2026-05-23
0.91%
probability
This CVE has a 0.91% probability of being exploited in the next 30 days.
0% Top 76.1th percentile of all CVEs 100%

CVSS v3.1

Source: VulnerabilityLookup (CIRCL)
8.8
HIGH
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Description

VulnerabilityLookup (CNA)
A type confusion issue was addressed with improved checks. This issue is fixed in Safari 17.3, iOS 15.8.7 and iPadOS 15.8.7, iOS 16.7.5 and iPadOS 16.7.5, iOS 17.3 and iPadOS 17.3, macOS Monterey 12.7.3, macOS Sonoma 14.3, macOS Ventura 13.6.4, tvOS 17.3, visionOS 1.0.2. Processing maliciously crafted web content may lead to arbitrary code execution. This fix associated with the Coruna exploit was shipped in iOS 17.3 on January 22, 2024. This update brings that fix to devices that cannot update to the latest iOS version.

Affected Products

Apple
Safari
0
Apple
iOS and iPadOS
0 0 0
Apple
macOS
0 0 0
Apple
tvOS
0
Apple
visionOS
0

Attack Intelligence

Google Project Zero

Patched
Jan. 22, 2024
Reported by
???
Root Cause Analysis
???

Exploits & PoC

FuzzySecurity/Cassowary-CVE-2024-23222-x86_64

Adaptation of Cassowary CVE-2024-23222 for Linux x86_64

10 2026-03-13
Rohitberiwala/CVE-2024-23222-Coruna-Exploit-Kit-Deobfuscated

Comprehensive deobfuscated research of the Coruna iOS exploit kit targeting CVE-2024-23222. Analysis of WebKit Type Confusion, PAC Bypass, and Sandbox

3 2026-03-10
Meysamshiralii/coruna_analysis

Analyze and deobfuscate the Coruna Exploit Kit (CVE-2024-23222) to enhance understanding and detection of related threats.

1 2026-05-23
3 repos — triés par ⭐ Rechercher sur GitHub ↗

Signal Intelligence

Confidence
92%
EPSS 0.91%
CVSS v3.1 8.8
Mentions 8
Last Seen Mar 18, 2026

CNA Information

CNA Assigner
apple

Analyst Note

This CVE merits confirmed status due to multiple corroborating indicators: Apple explicitly acknowledged active exploitation in the wild, it is tracked by Google Project Zero, and multiple credible sources (BleepingComputer, CERT-EU) independently reported its active exploitation. The high CVSS score (8.8) combined with demonstrated real-world attacks in 2024 provides strong evidence of confirmation.

Threat Actors 10

MuddyWater
apt_group Information theft and espionage 🇮🇷 IR
Lazarus Group
apt_group Information theft and espionage 🇰🇵 KP
Cobalt
apt_group Financial crime 🇷🇺 RU
APT37
apt_group Information theft and espionage 🇰🇵 KP
Kimsuky
apt_group Information theft and espionage 🇰🇷 KR
CHRYSENE
apt_group Information theft and espionage 🇮🇷 IR
UAC-0020
apt_group 🇺🇦 UA
SideWinder
apt_group 🇮🇳 IN
RAZOR TIGER
apt_group Information theft and espionage 🇮🇳 IN
Larva-208
apt_group 🇷🇺 RU

Triage Info

Decided atMar 03, 2026
Published DateJan 23, 2024