INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global phishing Multiple sectors HIGH 33m Global insider Cybersecurity Services CRITICAL 43m Global ransomware Multiple sectors (U.S. companies) CRITICAL 56m Global malware Financial Services, Cryptocurrency CRITICAL 1h Global malware Technology and Cloud Services HIGH 1h Global general Financial Services and E-commerce MEDIUM 1h Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 2h Global phishing Technology and Consumer Services HIGH 2h Global data_breach Multiple sectors HIGH 2h Global phishing Multiple sectors HIGH 33m Global insider Cybersecurity Services CRITICAL 43m Global ransomware Multiple sectors (U.S. companies) CRITICAL 56m Global malware Financial Services, Cryptocurrency CRITICAL 1h Global malware Technology and Cloud Services HIGH 1h Global general Financial Services and E-commerce MEDIUM 1h Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 2h Global phishing Technology and Consumer Services HIGH 2h Global data_breach Multiple sectors HIGH 2h Global phishing Multiple sectors HIGH 33m Global insider Cybersecurity Services CRITICAL 43m Global ransomware Multiple sectors (U.S. companies) CRITICAL 56m Global malware Financial Services, Cryptocurrency CRITICAL 1h Global malware Technology and Cloud Services HIGH 1h Global general Financial Services and E-commerce MEDIUM 1h Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 2h Global phishing Technology and Consumer Services HIGH 2h Global data_breach Multiple sectors HIGH 2h
Vulnerabilities

CVE-2023-32373

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Apple Multiple Products WebKit Use-After-Free Vulnerability — Apple iOS, iPadOS, macOS, tvOS, watchOS, and Safari WebKit contain a use-after-free vulnerability that leads to code execution when proces
Published: May 22, 2023  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Apple Multiple Products WebKit Use-After-Free Vulnerability — Apple iOS, iPadOS, macOS, tvOS, watchOS, and Safari WebKit contain a use-after-free vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.

🤖 AI Executive Summary

CVE-2023-32373 is a critical use-after-free vulnerability in Apple WebKit affecting iOS, iPadOS, macOS, tvOS, watchOS, and Safari, with a CVSS score of 9.0. An attacker can achieve arbitrary code execution by luring a victim to visit a maliciously crafted webpage, requiring no special privileges or user interaction beyond browsing. This vulnerability has been actively exploited in the wild, making it a zero-day threat that demands immediate attention. Apple has released patches, and organizations must prioritize deployment across all affected Apple platforms without delay.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 18, 2026 18:06
🇸🇦 Saudi Arabia Impact Assessment
This vulnerability poses a severe risk to Saudi organizations across all sectors due to the widespread use of Apple devices in enterprise and government environments. Banking and financial institutions regulated by SAMA are at high risk as employees and customers use iPhones and Macs for mobile banking, corporate email, and financial transactions. Government entities under NCA oversight face exposure through executive and staff Apple devices used for sensitive communications. The energy sector, including Saudi Aramco and NEOM-related projects, is at risk given the prevalence of Apple devices among engineers and executives. Healthcare organizations using Apple devices for patient management and clinical workflows are also vulnerable. Telecom providers such as STC and Zain face risk through both internal device fleets and customer-facing services. Given that this is an actively exploited zero-day, threat actors including nation-state groups known to target Gulf region infrastructure may leverage this vulnerability for espionage or lateral movement.
🏢 Affected Saudi Sectors
Banking Government Energy Healthcare Telecom Education Retail Transportation
⚖️ Saudi Risk Score (AI)
9.4
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS (within 24 hours):
1. Inventory all Apple devices (iPhone, iPad, Mac, Apple TV, Apple Watch) across the organization using MDM solutions (Jamf, Microsoft Intune, VMware Workspace ONE).
2. Isolate or restrict web browsing on unpatched Apple devices from accessing untrusted or external websites.
3. Enable web content filtering and restrict access to unknown/untrusted domains via proxy or DNS filtering.
4. Alert SOC teams to monitor for suspicious activity originating from Apple devices.

PATCHING GUIDANCE:
- Update iOS/iPadOS to 16.4.1 or later (or 15.7.5 for older devices).
- Update macOS Ventura to 13.3.1, macOS Monterey to 12.6.5, macOS Big Sur to 11.7.6.
- Update Safari to version 16.4.1 or later.
- Update tvOS to 16.4.2 and watchOS to 9.4.2.
- Use MDM/EMM platforms to enforce and verify patch compliance across all managed devices.

COMPENSATING CONTROLS (if patching is delayed):
- Disable JavaScript in Safari (Settings > Safari > Advanced > JavaScript) as a temporary measure.
- Deploy Mobile Threat Defense (MTD) solutions such as Lookout, Zimperium, or Microsoft Defender for Endpoint on mobile.
- Restrict access to corporate resources from unpatched Apple devices via conditional access policies.
- Implement network-level web filtering to block known malicious domains.

DETECTION RULES:
- Monitor EDR/XDR telemetry for unusual process spawning from Safari or WebKit-related processes.
- Create SIEM alerts for unexpected outbound connections from Apple device user agents.
- Deploy threat intelligence feeds to block known exploit delivery infrastructure.
- Review proxy logs for suspicious web content downloads targeting Apple user agents.
- Enable Apple Rapid Security Response updates for faster future patch deployment.
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية (خلال 24 ساعة):
1. جرد جميع أجهزة Apple (iPhone وiPad وMac وApple TV وApple Watch) عبر حلول إدارة الأجهزة المحمولة مثل Jamf أو Microsoft Intune.
2. عزل أجهزة Apple غير المُحدَّثة أو تقييد تصفحها للمواقع الخارجية وغير الموثوقة.
3. تفعيل تصفية محتوى الويب وتقييد الوصول إلى النطاقات المجهولة عبر البروكسي أو تصفية DNS.
4. تنبيه فرق مركز العمليات الأمنية لمراقبة الأنشطة المشبوهة الصادرة من أجهزة Apple.

إرشادات التحديث:
- تحديث iOS/iPadOS إلى الإصدار 16.4.1 أو أحدث (أو 15.7.5 للأجهزة القديمة).
- تحديث macOS Ventura إلى 13.3.1 وmacOS Monterey إلى 12.6.5 وmacOS Big Sur إلى 11.7.6.
- تحديث Safari إلى الإصدار 16.4.1 أو أحدث.
- تحديث tvOS إلى 16.4.2 وwatchOS إلى 9.4.2.
- استخدام منصات MDM/EMM لفرض الامتثال للتحديثات والتحقق منه على جميع الأجهزة المُدارة.

ضوابط التعويض (في حال تأخر التحديث):
- تعطيل JavaScript في Safari مؤقتاً (الإعدادات > Safari > متقدم > JavaScript).
- نشر حلول الحماية من التهديدات المحمولة مثل Lookout أو Zimperium أو Microsoft Defender.
- تقييد الوصول إلى موارد الشركة من الأجهزة غير المُحدَّثة عبر سياسات الوصول المشروط.
- تطبيق تصفية الويب على مستوى الشبكة لحجب النطاقات الضارة المعروفة.

قواعد الكشف:
- مراقبة بيانات EDR/XDR للكشف عن عمليات غير معتادة تنبثق من Safari أو عمليات WebKit.
- إنشاء تنبيهات SIEM للاتصالات الصادرة غير المتوقعة من وكلاء مستخدمي أجهزة Apple.
- نشر خلاصات معلومات التهديدات لحجب البنية التحتية المعروفة لتوصيل الاستغلال.
- مراجعة سجلات البروكسي للكشف عن تنزيلات محتوى ويب مشبوهة تستهدف وكلاء مستخدمي Apple.
- تفعيل تحديثات Apple للاستجابة الأمنية السريعة لتسريع نشر التحديثات مستقبلاً.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-1-4-2: Cybersecurity Vulnerability Management — patch critical vulnerabilities within defined SLAs ECC-1-3-2: Asset Management — maintain inventory of all Apple devices ECC-2-2-1: Mobile Device Security — enforce MDM policies and patch compliance ECC-2-3-1: Endpoint Security — deploy and maintain endpoint protection on all devices ECC-1-5-1: Cybersecurity Incident Management — activate IR procedures for actively exploited CVEs
🔵 SAMA CSF
Cyber Risk Management — 3.3.5: Vulnerability and patch management processes Cyber Security Operations — 4.3.3: Endpoint security controls for mobile and desktop devices Third-Party Cybersecurity — 3.7: Assess risk from third-party Apple ecosystem dependencies Cyber Incident Management — 4.5: Respond to actively exploited vulnerabilities as security incidents
🟡 ISO 27001:2022
A.8.8 — Management of technical vulnerabilities: Apply patches within risk-based timelines A.8.7 — Protection against malware: Deploy endpoint protection on Apple devices A.8.9 — Configuration management: Enforce secure configurations via MDM A.5.30 — ICT readiness for business continuity: Ensure patching does not disrupt operations A.6.8 — Information security event reporting: Report exploitation attempts to CERT
🟣 PCI DSS v4.0
Requirement 6.3.3 — All system components are protected from known vulnerabilities by installing applicable security patches Requirement 12.3.2 — Targeted risk analysis for critical asset patching timelines Requirement 5.2 — Anti-malware solutions deployed on all applicable system components
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Apple:Multiple Products
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS0.02%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2023-06-12
Published 2023-05-22
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
9.4
/ 10.0 — Saudi Risk
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.