INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global phishing Multiple sectors HIGH 33m Global insider Cybersecurity Services CRITICAL 43m Global ransomware Multiple sectors (U.S. companies) CRITICAL 56m Global malware Financial Services, Cryptocurrency CRITICAL 1h Global malware Technology and Cloud Services HIGH 1h Global general Financial Services and E-commerce MEDIUM 1h Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 2h Global phishing Technology and Consumer Services HIGH 2h Global data_breach Multiple sectors HIGH 2h Global phishing Multiple sectors HIGH 33m Global insider Cybersecurity Services CRITICAL 43m Global ransomware Multiple sectors (U.S. companies) CRITICAL 56m Global malware Financial Services, Cryptocurrency CRITICAL 1h Global malware Technology and Cloud Services HIGH 1h Global general Financial Services and E-commerce MEDIUM 1h Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 2h Global phishing Technology and Consumer Services HIGH 2h Global data_breach Multiple sectors HIGH 2h Global phishing Multiple sectors HIGH 33m Global insider Cybersecurity Services CRITICAL 43m Global ransomware Multiple sectors (U.S. companies) CRITICAL 56m Global malware Financial Services, Cryptocurrency CRITICAL 1h Global malware Technology and Cloud Services HIGH 1h Global general Financial Services and E-commerce MEDIUM 1h Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 2h Global phishing Technology and Consumer Services HIGH 2h Global data_breach Multiple sectors HIGH 2h
Vulnerabilities

CVE-2023-32435

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Apple Multiple Products WebKit Memory Corruption Vulnerability — Apple iOS, iPadOS, macOS, and Safari WebKit contain a memory corruption vulnerability that leads to code execution when processing mali
Published: Jun 23, 2023  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Apple Multiple Products WebKit Memory Corruption Vulnerability — Apple iOS, iPadOS, macOS, and Safari WebKit contain a memory corruption vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.

🤖 AI Executive Summary

CVE-2023-32435 is a critical memory corruption vulnerability in Apple's WebKit browser engine affecting iOS, iPadOS, macOS, and Safari, with a CVSS score of 9.0. Processing maliciously crafted web content can trigger arbitrary code execution, allowing attackers to fully compromise affected devices. This vulnerability has a confirmed exploit in the wild, making it an actively exploited zero-day that demands immediate attention. The breadth of affected Apple products — spanning mobile, desktop, and browser platforms — significantly expands the attack surface across enterprise and government environments.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 18, 2026 15:02
🇸🇦 Saudi Arabia Impact Assessment
Saudi organizations face elevated risk given the widespread adoption of Apple devices across government ministries, financial institutions, and critical infrastructure sectors. Banking and financial institutions regulated by SAMA are particularly exposed as employees and customers use Safari on iOS/macOS for online banking portals and internal applications. Government entities under NCA oversight using Apple endpoints for sensitive communications face potential data exfiltration and lateral movement risks. Energy sector organizations such as Saudi Aramco and NEOM projects with field personnel using iPads and iPhones for operational management are at risk of device compromise. Healthcare organizations using Apple devices for patient management systems and telehealth platforms face HIPAA-equivalent data breach risks under Saudi health data regulations. The exploit-in-the-wild status suggests nation-state and advanced threat actors may already be targeting Saudi high-value individuals and organizations.
🏢 Affected Saudi Sectors
Banking Government Energy Healthcare Telecom Defense Education Retail
⚖️ Saudi Risk Score (AI)
9.2
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS (0-24 hours):
1. Inventory all Apple devices (iPhone, iPad, Mac) across the organization running iOS < 16.5, iPadOS < 16.5, macOS Ventura < 13.4, macOS Monterey < 12.6.6, macOS Big Sur < 11.7.7, and Safari < 16.5.
2. Restrict or block access to untrusted web content on unpatched Apple devices via MDM policies.
3. Enable Lockdown Mode on high-risk individuals' devices (executives, IT admins, security personnel) as an immediate compensating control.

PATCHING GUIDANCE:
4. Apply Apple security updates immediately: iOS 16.5, iPadOS 16.5, macOS Ventura 13.4, macOS Monterey 12.6.6, macOS Big Sur 11.7.7, Safari 16.5.
5. Use MDM solutions (Jamf, Microsoft Intune) to enforce and verify patch deployment across all managed Apple devices.
6. Prioritize patching for devices used by privileged users, executives, and those accessing sensitive systems.

COMPENSATING CONTROLS:
7. Deploy web filtering and proxy solutions to block known malicious domains delivering exploit payloads.
8. Enforce certificate pinning and restrict Safari to approved enterprise sites via MDM configuration profiles.
9. Disable JavaScript execution in Safari for untrusted sites where operationally feasible.
10. Implement network segmentation to limit blast radius if a device is compromised.

DETECTION RULES:
11. Monitor EDR/MDM telemetry for unusual process spawning from Safari or WebKit-related processes.
12. Create SIEM alerts for anomalous outbound connections from Apple devices post-web browsing activity.
13. Deploy threat intelligence feeds for known IOCs associated with CVE-2023-32435 exploitation campaigns.
14. Review Apple device logs for crash reports in WebKit processes as indicators of exploitation attempts.
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية (0-24 ساعة):
1. جرد جميع أجهزة Apple (iPhone وiPad وMac) عبر المؤسسة التي تعمل بإصدارات iOS أقل من 16.5 وiPadOS أقل من 16.5 وmacOS Ventura أقل من 13.4 وmacOS Monterey أقل من 12.6.6 وmacOS Big Sur أقل من 11.7.7 وSafari أقل من 16.5.
2. تقييد أو حظر الوصول إلى محتوى الويب غير الموثوق على أجهزة Apple غير المُرقَّعة عبر سياسات MDM.
3. تفعيل وضع القفل (Lockdown Mode) على أجهزة الأفراد عالي المخاطر (المديرين التنفيذيين ومسؤولي تقنية المعلومات وموظفي الأمن) كإجراء تعويضي فوري.

إرشادات التصحيح:
4. تطبيق تحديثات أمان Apple فوراً: iOS 16.5 وiPadOS 16.5 وmacOS Ventura 13.4 وmacOS Monterey 12.6.6 وmacOS Big Sur 11.7.7 وSafari 16.5.
5. استخدام حلول MDM (مثل Jamf وMicrosoft Intune) لفرض نشر التصحيحات والتحقق منها عبر جميع أجهزة Apple المُدارة.
6. إعطاء الأولوية لتصحيح الأجهزة المستخدمة من قِبل المستخدمين ذوي الامتيازات والمديرين التنفيذيين والمستخدمين الذين يصلون إلى الأنظمة الحساسة.

ضوابط التعويض:
7. نشر حلول تصفية الويب والوكيل لحظر النطاقات الضارة المعروفة التي تُوصّل حمولات الاستغلال.
8. فرض تثبيت الشهادات وتقييد Safari على المواقع المؤسسية المعتمدة عبر ملفات تعريف تكوين MDM.
9. تعطيل تنفيذ JavaScript في Safari للمواقع غير الموثوقة حيثما كان ذلك ممكناً تشغيلياً.
10. تنفيذ تجزئة الشبكة للحد من نطاق الضرر في حالة اختراق جهاز.

قواعد الكشف:
11. مراقبة بيانات EDR/MDM لاكتشاف عمليات غير عادية تنبثق من Safari أو العمليات المرتبطة بـ WebKit.
12. إنشاء تنبيهات SIEM للاتصالات الصادرة الشاذة من أجهزة Apple بعد نشاط تصفح الويب.
13. نشر موجزات استخبارات التهديدات لمؤشرات الاختراق المعروفة المرتبطة بحملات استغلال CVE-2023-32435.
14. مراجعة سجلات أجهزة Apple لتقارير الأعطال في عمليات WebKit كمؤشرات لمحاولات الاستغلال.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-1-4-2: Cybersecurity Vulnerability Management — mandatory patching of critical vulnerabilities ECC-1-3-2: Asset Management — inventory and classification of Apple endpoints ECC-2-2-1: Secure Configuration Management for endpoint devices ECC-1-5-1: Cybersecurity Event Management and monitoring for exploitation indicators ECC-3-3-3: Mobile Device Security and MDM policy enforcement
🔵 SAMA CSF
Cyber Security Operations — Vulnerability Management domain: timely patching of critical CVEs Endpoint Security — Mobile and desktop device hardening and patch compliance Threat Intelligence — Integration of exploit IOCs into detection capabilities Identity and Access Management — Privileged user device security controls Incident Management — Response procedures for active exploitation scenarios
🟡 ISO 27001:2022
A.8.8 — Management of technical vulnerabilities: immediate patching of CVSS 9.0 vulnerability A.8.7 — Protection against malware: web content filtering and exploit prevention A.8.9 — Configuration management: MDM-enforced secure configurations A.8.16 — Monitoring activities: detection of WebKit exploitation attempts A.5.30 — ICT readiness for business continuity: ensuring patched device availability
🟣 PCI DSS v4.0
Requirement 6.3.3 — All system components protected from known vulnerabilities by installing applicable security patches Requirement 12.3.2 — Targeted risk analysis for critical vulnerability remediation timelines Requirement 5.2 — Malicious software protection on devices accessing cardholder data environments
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Apple:Multiple Products
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS0.42%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2023-07-14
Published 2023-06-23
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
9.2
/ 10.0 — Saudi Risk
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.