CVE-2024-44309

ENISA EUVD: EUVD-2024-41208 ↗
Exploited in the Wild ✓ Confirmed 0-Day ★ Google Project Zero
Triaged: March 3, 2026 3 articles Published: 2024-11-19

EPSS Score

Source: FIRST.org · 2026-05-23
0.71%
probability
This CVE has a 0.71% probability of being exploited in the next 30 days.
0% Top 72.5th percentile of all CVEs 100%

CVSS v3.1

Source: VulnerabilityLookup (CIRCL)
6.3
MEDIUM
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

Description

VulnerabilityLookup (CNA)
A cookie management issue was addressed with improved state management. This issue is fixed in Safari 18.1.1, iOS 17.7.2 and iPadOS 17.7.2, iOS 18.1.1 and iPadOS 18.1.1, macOS Sequoia 15.1.1, visionOS 2.1.1. Processing maliciously crafted web content may lead to a cross site scripting attack. Apple is aware of a report that this issue may have been actively exploited on Intel-based Mac systems.

Affected Products

Apple
Safari
0
Apple
iOS and iPadOS
0 0
Apple
macOS
0
Apple
visionOS
0

Google Project Zero

Patched
Nov. 19, 2024
Reported by
Clément Lecigne and Benoît Sevens of Google's Threat Analysis Group
Root Cause Analysis
???

Signal Intelligence

Confidence
92%
EPSS 0.71%
CVSS v3.1 6.3
Mentions 3
Last Seen Nov 19, 2024

CNA Information

CNA Assigner
apple

Analyst Note

CVE-2024-44309 is confirmed as actively exploited zero-day affecting Safari on Intel-based Mac systems, with patches released across multiple Apple platforms. The vulnerability enables XSS attacks through maliciously crafted web content and has been documented by Google Project Zero, providing strong validation of the threat.

Threat Actors 3

RomCom
apt_group Financial gain 🇷🇺 RU
Void Rabisu
apt_group Financial gain 🇷🇺 RU
Red Dev 17
apt_group 🇨🇳 CN

Triage Info

Decided atMar 03, 2026
Published DateNov 19, 2024