August 5th, 2024

CVE-2024-40798 – an app may be able to read Safari's browsing history

CVE-2024-40798 is a newly identified vulnerability in Safari that may expose browsing history. It has been fixed in several Apple software updates and awaits analysis without a CVSS severity score.

Read original articleLink Icon
CVE-2024-40798 – an app may be able to read Safari's browsing history

CVE-2024-40798 is a newly identified vulnerability that is currently awaiting analysis. It has been reported that this issue involves inadequate redaction of sensitive information, which could potentially allow an application to access Safari's browsing history. The vulnerability has been addressed in several updates, including macOS Sonoma 14.6, iOS 16.7.9, iPadOS 16.7.9, macOS Monterey 12.7.6, and macOS Ventura 13.6.8. The National Vulnerability Database (NVD) has not yet provided a severity score for this vulnerability under the Common Vulnerability Scoring System (CVSS). The details were published on July 29, 2024, and the last modification was made on July 30, 2024. Apple Inc. is the source of this CVE entry, and they have provided several references for further information regarding the updates and fixes related to this vulnerability.

- CVE-2024-40798 involves a vulnerability in Safari that may expose browsing history.

- The issue has been fixed in multiple Apple software updates.

- The vulnerability is currently awaiting analysis and has no assigned CVSS severity score yet.

- Apple Inc. is the source of the CVE entry and has provided additional resources for users.

Link Icon 6 comments
By @TazeTSchnitzel - 6 months
This is only a vulnerability because macOS actually tries to sandbox access to user data (photos, documents, etc). On Windows or Linux being able to access all a user's data is expected, and thus spyware and ransomware don't even need administrator privileges to wreak havock. So, a win for Apple here.
By @CodesInChaos - 6 months
I understand that this is considered a vulnerability on iOS, since its security model includes isolating applications from each other.

But does macOS even attempt to sandbox applications like that? I assumed it's like Windows/Linux where traditionally applications have full access to a user's data and it only attempts to protect data of other users. On Windows/Linux attempts to introduce such isolation have seen little adoption so far. Has Apple been more successful on macOS?

By @herpdyderp - 6 months
Before you panic:

> This issue is fixed in macOS Sonoma 14.6, iOS 16.7.9 and iPadOS 16.7.9, macOS Monterey 12.7.6, macOS Ventura 13.6.8.

Okay now you can panic. But at least if your devices are up to date, it's fixed now...

By @complaintdept - 6 months
I'd like to see this run back to back with those recent Apple commercials.
By @captn3m0 - 6 months
yet another instance where apple's unclear support policies will cause more confusion. Was iOS 15 impacted, and will this be backported? Nobody knows. 15.8.3 was announced the same day as 16.7.9 but with zero CVE notes, so if you have one of these: iPhone 6s (all models), iPhone 7 (all models), iPhone SE (1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch (7th generation), it is unclear if you're receiving security fixes.