CVE-2024-54551
Description
The issue was addressed with improved memory handling. This issue is fixed in Safari 17.6, iOS 17.6 and iPadOS 17.6, macOS Sonoma 14.6, tvOS 17.6, visionOS 1.3, watchOS 10.6. Processing web content may lead to a denial-of-service.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Processing malicious web content in Apple systems may cause a denial-of-service via a memory handling flaw, fixed in July 2024 updates.
Vulnerability
Overview CVE-2024-54551 is a denial-of-service vulnerability in Apple's WebKit or related content processing engine. The root cause is a memory handling flaw that can be triggered when processing crafted web content, leading to an unexpected system termination or hang [1].
Exploitation
Details The attack surface is the browser or any application that renders web content using Apple's frameworks, such as Safari, Mail, or third-party apps using WKWebView. An attacker can exploit this by hosting a malicious webpage or injecting content into a legitimate page. No user interaction beyond visiting the page is required, and no special privileges are needed [1][2].
Impact
Successful exploitation results in a denial-of-service condition. The system or application may crash or become unresponsive, disrupting user activity. Apple rates this vulnerability as High severity with a CVSS v3 base score of 7.5, reflecting the low complexity and network-based attack vector [1].
Mitigation
Apple addressed the issue with improved memory handling in Safari 17.6, iOS 17.6 and iPadOS 17.6, macOS Sonoma 14.6, tvOS 17.6, visionOS 1.3, and watchOS 10.6, all released on July 29, 2024 [1][2][3][4]. Users should update their devices to the latest available versions to protect against potential exploitation. There is no evidence that this vulnerability was exploited in the wild before the patch.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
51cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*range: <17.6
- (no CPE)range: <17.6
- osv-coords43 versionspkg:rpm/almalinux/webkit2gtk3pkg:rpm/almalinux/webkit2gtk3-develpkg:rpm/almalinux/webkit2gtk3-jscpkg:rpm/almalinux/webkit2gtk3-jsc-develpkg:rpm/opensuse/webkit2gtk3&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/webkit2gtk3-soup2&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/webkit2gtk4&distro=openSUSE%20Leap%2015.6pkg:rpm/suse/webkit2gtk3&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/webkit2gtk3&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/webkit2gtk3&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-ESPOSpkg:rpm/suse/webkit2gtk3&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-LTSSpkg:rpm/suse/webkit2gtk3&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-ESPOSpkg:rpm/suse/webkit2gtk3&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-LTSSpkg:rpm/suse/webkit2gtk3&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Desktop%20Applications%2015%20SP6pkg:rpm/suse/webkit2gtk3&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSSpkg:rpm/suse/webkit2gtk3&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/webkit2gtk3&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP4-LTSSpkg:rpm/suse/webkit2gtk3&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP5-LTSSpkg:rpm/suse/webkit2gtk3&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/webkit2gtk3&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP4pkg:rpm/suse/webkit2gtk3&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP5pkg:rpm/suse/webkit2gtk3&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5pkg:rpm/suse/webkit2gtk3-soup2&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-ESPOSpkg:rpm/suse/webkit2gtk3-soup2&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-LTSSpkg:rpm/suse/webkit2gtk3-soup2&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-ESPOSpkg:rpm/suse/webkit2gtk3-soup2&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-LTSSpkg:rpm/suse/webkit2gtk3-soup2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP6pkg:rpm/suse/webkit2gtk3-soup2&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP4-LTSSpkg:rpm/suse/webkit2gtk3-soup2&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP5-LTSSpkg:rpm/suse/webkit2gtk3-soup2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP4pkg:rpm/suse/webkit2gtk3-soup2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP5pkg:rpm/suse/webkit2gtk3-soup2&distro=SUSE%20Manager%20Proxy%204.3pkg:rpm/suse/webkit2gtk3-soup2&distro=SUSE%20Manager%20Server%204.3pkg:rpm/suse/webkit2gtk4&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-ESPOSpkg:rpm/suse/webkit2gtk4&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-LTSSpkg:rpm/suse/webkit2gtk4&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-ESPOSpkg:rpm/suse/webkit2gtk4&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-LTSSpkg:rpm/suse/webkit2gtk4&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP6pkg:rpm/suse/webkit2gtk4&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP6pkg:rpm/suse/webkit2gtk4&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP4-LTSSpkg:rpm/suse/webkit2gtk4&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP5-LTSSpkg:rpm/suse/webkit2gtk4&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP4pkg:rpm/suse/webkit2gtk4&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP5
< 2.48.1-1.el9_5+ 42 more
- (no CPE)range: < 2.48.1-1.el9_5
- (no CPE)range: < 2.48.1-1.el9_5
- (no CPE)range: < 2.48.1-1.el9_5
- (no CPE)range: < 2.48.1-1.el9_5
- (no CPE)range: < 2.48.1-150600.12.36.5
- (no CPE)range: < 2.48.1-150600.12.36.5
- (no CPE)range: < 2.48.1-150600.12.36.5
- (no CPE)range: < 2.48.1-150200.142.1
- (no CPE)range: < 2.48.1-150200.142.1
- (no CPE)range: < 2.48.1-150400.4.115.2
- (no CPE)range: < 2.48.1-150400.4.115.2
- (no CPE)range: < 2.48.1-150400.4.115.2
- (no CPE)range: < 2.48.1-150400.4.115.2
- (no CPE)range: < 2.48.1-150600.12.36.5
- (no CPE)range: < 2.48.1-4.34.1
- (no CPE)range: < 2.48.1-150200.142.1
- (no CPE)range: < 2.48.1-150400.4.115.2
- (no CPE)range: < 2.48.1-150400.4.115.2
- (no CPE)range: < 2.48.1-150200.142.1
- (no CPE)range: < 2.48.1-150400.4.115.2
- (no CPE)range: < 2.48.1-150400.4.115.2
- (no CPE)range: < 2.48.1-4.34.1
- (no CPE)range: < 2.48.1-150400.4.115.2
- (no CPE)range: < 2.48.1-150400.4.115.2
- (no CPE)range: < 2.48.1-150400.4.115.2
- (no CPE)range: < 2.48.1-150400.4.115.2
- (no CPE)range: < 2.48.1-150600.12.36.5
- (no CPE)range: < 2.48.1-150400.4.115.2
- (no CPE)range: < 2.48.1-150400.4.115.2
- (no CPE)range: < 2.48.1-150400.4.115.2
- (no CPE)range: < 2.48.1-150400.4.115.2
- (no CPE)range: < 2.48.1-150400.4.115.2
- (no CPE)range: < 2.48.1-150400.4.115.2
- (no CPE)range: < 2.48.1-150400.4.115.2
- (no CPE)range: < 2.48.1-150400.4.115.2
- (no CPE)range: < 2.48.1-150400.4.115.2
- (no CPE)range: < 2.48.1-150400.4.115.2
- (no CPE)range: < 2.48.1-150600.12.36.5
- (no CPE)range: < 2.48.1-150600.12.36.5
- (no CPE)range: < 2.48.1-150400.4.115.2
- (no CPE)range: < 2.48.1-150400.4.115.2
- (no CPE)range: < 2.48.1-150400.4.115.2
- (no CPE)range: < 2.48.1-150400.4.115.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- support.apple.com/en-us/120909nvdRelease NotesVendor Advisory
- support.apple.com/en-us/120911nvdRelease NotesVendor Advisory
- support.apple.com/en-us/120913nvdRelease NotesVendor Advisory
- support.apple.com/en-us/120914nvdRelease NotesVendor Advisory
- support.apple.com/en-us/120915nvdRelease NotesVendor Advisory
- support.apple.com/en-us/120916nvdRelease NotesVendor Advisory
- lists.debian.org/debian-lts-announce/2025/06/msg00016.htmlnvd
News mentions
0No linked articles in our index yet.