CVE-2024-44309
ENISA EUVD: EUVD-2024-41208 ↗
Exploited in the Wild
✓ Confirmed 0-Day
★ Google Project Zero
Triaged: March 3, 2026
3 articles
Published: 2024-11-19
EPSS Score
Source: FIRST.org · 2026-05-23
0.71%
probability
This CVE has a 0.71% probability
of being exploited in the next 30 days.
0%
Top 72.5th percentile of all CVEs
100%
CVSS v3.1
Source: VulnerabilityLookup (CIRCL)6.3
MEDIUM
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
Description
VulnerabilityLookup (CNA)A cookie management issue was addressed with improved state management. This issue is fixed in Safari 18.1.1, iOS 17.7.2 and iPadOS 17.7.2, iOS 18.1.1 and iPadOS 18.1.1, macOS Sequoia 15.1.1, visionOS 2.1.1. Processing maliciously crafted web content may lead to a cross site scripting attack. Apple is aware of a report that this issue may have been actively exploited on Intel-based Mac systems.
Affected Products
Apple
Safari
0
Apple
iOS and iPadOS
0
0
Apple
macOS
0
Apple
visionOS
0
Attack Intelligence
Google Project Zero
Patched
Nov. 19, 2024
Reported by
Clément Lecigne and Benoît Sevens of Google's Threat Analysis Group
Root Cause Analysis
???
Signal Intelligence
Confidence
92%
EPSS
0.71%
CVSS v3.1
6.3
Mentions
3
Last Seen
Nov 19, 2024
CNA Information
CNA Assigner
apple
Analyst Note
CVE-2024-44309 is confirmed as actively exploited zero-day affecting Safari on Intel-based Mac systems, with patches released across multiple Apple platforms. The vulnerability enables XSS attacks through maliciously crafted web content and has been documented by Google Project Zero, providing strong validation of the threat.
Threat Actors 3
RomCom
apt_group
Financial gain
🇷🇺 RU
Void Rabisu
apt_group
Financial gain
🇷🇺 RU
Red Dev 17
apt_group
🇨🇳 CN
Triage Info
Decided atMar 03, 2026
Published DateNov 19, 2024