<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/cpes/cpe2.3oappleiphone_os/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 19 May 2026 11:01:36 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/cpes/cpe2.3oappleiphone_os/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2024-23222 Apple Safari Type Confusion Leading to Sandbox Escape</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2024-23222-safari-type-confusion/</link><pubDate>Tue, 19 May 2026 11:01:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2024-23222-safari-type-confusion/</guid><description>A type confusion vulnerability exists in Apple Safari, as detailed in CVE-2024-23222. A public exploit demonstrates successful exploitation of the vulnerability on iOS 16.4.1, leading to a sandbox escape, which has been patched in iOS 17.3 and macOS 14.3.</description><content:encoded><![CDATA[<p>A public exploit was published demonstrating a type confusion vulnerability in Apple Safari, identified as CVE-2024-23222. This vulnerability affects Apple Safari on iOS 16.4.1. The exploit allows for a sandbox escape on iPhone X (A11 Bionic) devices. The exploit is delivered entirely as a single HTML page served over HTTP. The exploit code leverages a flaw in JavaScriptCore (JSC) related to the handling of <code>Float64Array</code> and <code>WebAssembly.Instance</code> objects during garbage collection (GC). This can lead to arbitrary native function calls and ultimately a sandbox escape, allowing the attacker to write files to the filesystem outside of the Safari sandbox. The vulnerability was patched in iOS 17.3 and macOS 14.3.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The user visits a malicious webpage containing the exploit code.</li>
<li>The exploit triggers CVE-2024-23222, a type confusion vulnerability in the JavaScriptCore (JSC) JIT engine.</li>
<li>The type confusion occurs between a <code>Float64Array</code> and a <code>WebAssembly.Instance</code> due to a race condition during garbage collection.</li>
<li>Successful exploitation allows the attacker to gain arbitrary read and write capabilities in memory, specifically addrof(obj), read64(addr), and write64(addr).</li>
<li>The exploit leverages a CALLER_WASM module with a call_indirect to gain arbitrary native function call capability. ASLR slide discovery is performed statically.</li>
<li>The exploit calls _getpid() and _getuid() to confirm arbitrary C function invocation and to determine the user context (mobile).</li>
<li>The exploit calls _open(&quot;/tmp/pwned_cve_2024_23222&quot;) to escape the sandbox and creates a file on the filesystem.</li>
<li>The exploit calls _write(fd, &ldquo;PWNED&hellip;&rdquo;, 57) to write data to the file, confirming the sandbox escape.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2024-23222 leads to a sandbox escape in Apple Safari on iOS 16.4.1. This allows an attacker to perform actions outside the normal restrictions of the browser&rsquo;s sandbox, such as writing arbitrary files to the filesystem. In the demonstrated exploit, a file named <code>/tmp/pwned_cve_2024_23222</code> is created with the content &ldquo;PWNED CVE-2024-23222 WebKit sandbox escape on iOS 16.4.1&rdquo;. While the provided exploit targets iOS 16.4.1 on an iPhone X, other devices and versions may be vulnerable until patched. The vulnerability was patched in iOS 17.3 and macOS 14.3.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for requests to exploit-related URLs, such as <code>exploit_stage2.html</code>, <code>exploit_23222.html</code>, and <code>cve-2023-*.html</code> as mentioned in the file structure section of the report.</li>
<li>Apply the latest security patches for iOS and macOS to mitigate CVE-2024-23222 as the vulnerability has been fixed in iOS 17.3 and macOS 14.3.</li>
<li>Deploy the Sigma rule to detect potential exploitation attempts of CVE-2024-23222 by monitoring for unexpected file creations in <code>/tmp/</code>.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>cve-2024-23222</category><category>type-confusion</category><category>sandbox-escape</category><category>webkit</category></item></channel></rss>