Vulnerability Description
The issue was addressed with improved routing of Safari-originated requests. This issue is fixed in Safari 18.2, iOS 18.2 and iPadOS 18.2, iPadOS 17.7.3, macOS Sequoia 15.2. On a device with Private Relay enabled, adding a website to the Safari Reading List may reveal the originating IP address to the website.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apple | Safari | < 18.2 |
| Apple | Ipados | < 17.7.3 |
| Apple | Iphone Os | >= 18.0, < 18.2 |
| Apple | Macos | >= 15.0, < 15.2 |
Related Weaknesses (CWE)
References
- https://support.apple.com/en-us/121837Vendor Advisory
- https://support.apple.com/en-us/121838Vendor Advisory
- https://support.apple.com/en-us/121839Vendor Advisory
- https://support.apple.com/en-us/121846Vendor Advisory
- http://seclists.org/fulldisclosure/2024/Dec/13
- http://seclists.org/fulldisclosure/2024/Dec/6
- http://seclists.org/fulldisclosure/2024/Dec/7
FAQ
What is CVE-2024-44246?
CVE-2024-44246 is a vulnerability with a CVSS score of 5.3 (MEDIUM). The issue was addressed with improved routing of Safari-originated requests. This issue is fixed in Safari 18.2, iOS 18.2 and iPadOS 18.2, iPadOS 17.7.3, macOS Sequoia 15.2. On a device with Private R...
How severe is CVE-2024-44246?
CVE-2024-44246 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-44246?
Check the references section above for vendor advisories and patch information. Affected products include: Apple Safari, Apple Ipados, Apple Iphone Os, Apple Macos.