Windows ARM64 Internals: Deconstructing Pointer Authentication | Prelude

Explore how Windows implements Pointer Authentication (PAC) on ARM64β€”covering bootloader setup, per-process keys, HyperGuard, and memory-safety defenses.

Safari 17.5 Security Update: Pointer Authentication Bypass

Date: May 13, 2024

CVE: CVE-2024-27834

Vulnerability Type: Bypass of a Security Mechanism

CWE: [[CWE-347]], [[CWE-20]]

Sources: Apple Support, CVE Details, Vulmon

Issue Summary

A security issue in Safari 17.5 allows attackers to bypass Pointer Authentication, a feature designed to prevent unauthorized code execution by verifying the integrity of pointers. This vulnerability, identified as CVE-2024-27834, can be exploited by attackers with arbitrary read and write capabilities.

Technical Key Findings

Pointer Authentication works by adding cryptographic signatures to pointers, which are verified upon use. The vulnerability arises when an attacker manipulates pointers without triggering the security checks, allowing them to execute arbitrary code or access protected memory regions.

Vulnerable Products

  • Safari 17.5 on macOS Monterey
  • Safari 17.5 on macOS Ventura

Impact Assessment

If exploited, this vulnerability can lead to arbitrary code execution and unauthorized access to sensitive memory areas, potentially compromising the entire system's security.

Patches or Workaround

Apple has addressed this issue with improved checks in the latest updates. Users are advised to update to mitigate the risk.

Tags

#CVE-2024-27834 #PointerAuthentication #Safari #macOS #iOS #SecurityUpdate #Vulnerability #Bypass #Apple #WebKit

About the security content of Safari 17.5

This document describes the security content of Safari 17.5.

Apple Support