CVE-2024-44308 — The issue was addressed with improved checks. This issue is fixed in Safari…
🚨 CVE-2024-44308 The issue was addressed with improved checks. This issue is fixed in Safari 18.1.1, iOS 17.7.2 and iPadOS 17.7.2, iOS 18.1.1 and iPadOS 18.1.1, macOS Sequoia 15.1.1, visionOS 2.1.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited on Intel-based Mac systems.
What This Means For You
- Active exploitation reported — immediate attention recommended.
- Affects Apple ecosystem — update macOS/iOS devices.
- New vulnerability disclosed — verify if your stack is exposed.
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2024-44308 | RCE | Safari versions prior to 18.1.1, iOS versions prior to 17.7.2 and 18.1.1, iPadOS versions prior to 17.7.2 and 18.1.1, macOS Sequoia versions prior to 15.1.1, visionOS versions prior to 2.1.1. Vulnerability allows arbitrary code execution when processing maliciously crafted web content. |
| CVE-2024-44308 | RCE | Intel-based Mac systems actively exploited. Vulnerability allows arbitrary code execution when processing maliciously crafted web content. |
🔎
Turn this CVE into SIEM detection coverage
Generate detection rules for Splunk, Sentinel, QRadar & Elastic — straight from this vulnerability. Use /detect in the Intel Bot.
Open Intel Bot →
Source & Attribution
| Source Platform | Telegram |
| Channel | CVE Notify |
| Published | April 03, 2026 at 14:56 UTC |
This content was curated and summarized by Shimi's Cyber World for informational purposes. It is not copied or republished in full. All intellectual property rights remain with the original author and source.
Believe this infringes your rights? Submit a takedown request.