Safari 17.5 Security Update: Pointer Authentication Bypass
Date: May 13, 2024
CVE: CVE-2024-27834
Vulnerability Type: Bypass of a Security Mechanism
CWE: [[CWE-347]], [[CWE-20]]
Sources: Apple Support, CVE Details, Vulmon
Issue Summary
A security issue in Safari 17.5 allows attackers to bypass Pointer Authentication, a feature designed to prevent unauthorized code execution by verifying the integrity of pointers. This vulnerability, identified as CVE-2024-27834, can be exploited by attackers with arbitrary read and write capabilities.
Technical Key Findings
Pointer Authentication works by adding cryptographic signatures to pointers, which are verified upon use. The vulnerability arises when an attacker manipulates pointers without triggering the security checks, allowing them to execute arbitrary code or access protected memory regions.
Vulnerable Products
- Safari 17.5 on macOS Monterey
- Safari 17.5 on macOS Ventura
Impact Assessment
If exploited, this vulnerability can lead to arbitrary code execution and unauthorized access to sensitive memory areas, potentially compromising the entire system's security.
Patches or Workaround
Apple has addressed this issue with improved checks in the latest updates. Users are advised to update to mitigate the risk.
Tags
#CVE-2024-27834 #PointerAuthentication #Safari #macOS #iOS #SecurityUpdate #Vulnerability #Bypass #Apple #WebKit