Apple Under Fire as WebKit Zero-Days Are Exploited
Multiple zero-day vulnerabilities targeting Apple’s WebKit browser engine have surfaced in active exploits—shifting the company into rapid response mode. These flaws, discovered in early 2024, affect iPhones, iPads, and Macs, with attackers deploying them in the wild long before patches became available. Apple's recent security advisories underscore the real-time threat and the scale of the exposure.
WebKit powers Safari and underpins every browser on iOS due to Apple’s app store policies. This unique position makes it a high-value target; any breach in WebKit’s defenses ripples across millions of devices. When WebKit is compromised, it's not just browser security that’s at stake. Embedded apps that rely on WebViews, secure sandboxing, and system-wide content rendering pipelines all become vulnerable.
Why does this matter now? Because users haven't just been exposed in theory—real-world attacks have already leveraged these flaws. Stay with us as we examine who’s affected, how these exploits operate, and what Apple is doing in response.
WebKit is an open-source browser engine developed by Apple and used primarily in its Safari browser. It provides the rendering layer responsible for interpreting and displaying web content—HTML, CSS, JavaScript—on Apple devices. WebKit originated as a fork of the KHTML engine from the KDE project and quickly evolved under Apple’s stewardship into one of the most widely deployed rendering engines in the mobile world.
On iPhones, iPads, and Macs, WebKit powers Safari and also works behind the scenes in third-party browsers and apps. Unlike Android, where Chromium-based engines are permitted for alternatives like Chrome or Firefox, Apple mandates all third-party browsers on iOS to use WebKit as their underlying engine. This standardization centralizes internet rendering through WebKit across the platform landscape.
Beyond browsers, apps that display embedded web content—ranging from messaging platforms to social media clients—rely on WKWebView or UIWebView components, both built on WebKit. Because of this architectural design, any web-based content served within Apple’s mobile or desktop UX flows through the same pipeline.
WebKit’s ubiquity in macOS and iOS makes it a high-value target. Attackers focusing on WebKit can potentially gain entry into a broad array of native and third-party applications. Its deep integration within system-level components—combined with its open-source visibility—provides threat actors with ample surface area to identify, examine, and exploit weaknesses.
When exploits succeed within WebKit, they bypass multiple sandboxing layers and potentially reach sensitive memory areas or user data. Given that WebKit receives and executes untrusted content from the internet continuously, its exposure to zero-day attacks is persistent and unavoidable. One successful zero-day in WebKit can deliver a payload capable of reaching the core of the user's digital environment.
So, how does this translate into real-world risk in Apple’s ecosystem? The next section details the exact nature of the vulnerabilities exploited and how attackers are leveraging them.
Attackers have actively exploited multiple zero-day vulnerabilities in WebKit, the browser engine powering Safari and other core components of iOS and macOS. These attacks leveraged unknown and unpatched flaws, giving threat actors a critical time advantage before Apple could develop and deploy fixes. Two CVEs stand out in recent disclosures: CVE-2023-28204 and CVE-2023-28206, both identified as being actively exploited in the wild according to Apple’s security bulletins released in April 2023.
These vulnerabilities impacted nearly the entire Apple ecosystem. Devices running older and current versions of iOS and macOS became vulnerable to remote code execution and privilege escalation. In practical terms, an attacker could trick a user into visiting a malicious website, triggering WebKit’s memory corruption and executing code with the app’s privileges—or worse, escalate further with the kernel-level exploit.
This combination created a complete attack chain. An exploit delivered through Safari or another WebKit-based app could initiate remote code execution. If the attack included CVE-2023-28206, it could escalate to root access, bypassing Apple’s app sandbox framework and security controls at the operating system level.
The designation of these vulnerabilities as “zero-day” indicates that they were actively exploited before Apple became aware of them. This delay in detection and disclosure meant that attackers possessed a powerful level of access without triggering system defenses or user suspicion. In every confirmed case, Apple acknowledged in its disclosures that it “is aware of a report that this issue may have been actively exploited.”
Zero-days remove the safety net. Targeted attacks become indistinguishable from normal browser behavior, especially on mobile devices where antivirus software offers limited protection and user privileges are tightly restricted. When attackers stay ahead of vendor patches, defense becomes reactive—not proactive—and the exploitation window can last weeks or months before mitigation begins.
The impact of the recent WebKit zero-day vulnerabilities extends beyond isolated incidents. These flaws directly target the rendering engine used across Safari and every browser on iOS, placing a wide range of Apple device users in harm’s way. Not only have attackers already exploited these vulnerabilities, but they have also weaponized them to bypass native platform protections.
All Apple hardware running iOS, iPadOS, and macOS is potentially vulnerable, including:
Attackers have utilized these WebKit entry points to implant sophisticated spyware without user interaction. By luring victims to a malicious site, they can execute code remotely. This method, known as a “zero-click” exploit, leaves no visual or behavioral trace, making it highly effective in deploying surveillance tools. Once inside, spyware can access:
Beyond spyware risks, WebKit vulnerabilities grant attackers an opportunity to intercept private sessions and exfiltrate sensitive data. Through cross-site scripting (XSS) and injection attacks, unauthorized scripts can hijack cookies, reuse authentication tokens, or impersonate user identities. Personal browsing patterns, keystrokes, and even facial ID data—when used on certain authentication flows—are all compromised endpoints.
Whether used for state surveillance, corporate espionage, or targeted attacks against individuals, these exploits shatter the conventional perception of safety within the Apple ecosystem. Every click on an untrusted webpage can open the door to persistent tracking and data harvesting. Think twice before assuming a locked-down ecosystem means absolute security.
Threat actors are delivering the WebKit zero-day exploits through carefully crafted websites designed to trigger the vulnerabilities as soon as a user visits the page. These websites use malicious JavaScript that executes arbitrary code within the WebKit rendering engine, sidestepping standard sandboxing protections implemented in iOS and macOS.
Exploitation does not require user interaction beyond simply opening a webpage or clicking a deceptive link—often included within phishing emails or messages. Once the malicious code runs, attackers can escalate privileges and potentially take control of the device, access sensitive data, or install spyware without detection.
Security analysts from Citizen Lab and Google's Threat Analysis Group have linked recent WebKit-based exploits to state-sponsored hacking groups. In particular, campaigns tied to NSO Group's Pegasus spyware and other attribution-suspected APT (Advanced Persistent Threat) actors have incorporated similar zero-day flaws, reinforcing a consistent pattern of interest in WebKit vulnerabilities.
These actors prioritize stealth, often deploying exploits through one-time-use delivery infrastructure, making forensic analysis difficult. The infrastructure is routinely cycled and hosted in regions complicating cross-border cooperation in takedown efforts.
The tactics used in these new WebKit-zero-day exploits mirror patterns observed in previous nation-state spyware operations. Specific similarities include:
The technical sophistication of these operations, combined with tight operational security, strongly indicates support by well-funded, state-level entities. Unlike financially motivated cybercrime groups that cast wide nets, these attackers select targets with surgical precision and execute attacks that minimize exposure.
In direct response to active exploitation of two zero-day vulnerabilities in WebKit—CVE-2024-23222 and CVE-2024-23225—Apple issued emergency updates across its ecosystem. These updates patch malicious code execution vulnerabilities that allowed attackers to execute arbitrary code via maliciously crafted web content. The first, affecting processing of web content, and the second, tied to memory corruption, were actively used in the wild before public disclosure.
Apple released Rapid Security Response updates separate from routine software updates to limit exposure time. These patches applied immediate fixes to the browser engine without the need for full OS version changes. Safari 17.3.1 addresses these flaws on older macOS systems, while iOS and iPadOS received updates under 17.3.1 and 16.7.5 (for devices not supporting the latest OS versions).
Earlier devices not capable of running iOS 16 or macOS Monterey did not receive individual patches for these specific exploits. However, Apple continues to provide limited security patches for selected legacy hardware through separate update channels.
The released patches directly target and neutralize the known WebKit zero-day exploits identified by security researchers. Post-update CVE bulletins confirm mitigation of the attack vectors used for zero-click remote code execution. Real-world testing shows that exploitation paths previously effective no longer succeed after patch installation.
Some structural WebKit sandboxing issues remain outside the scope of these emergency patches. Additionally, the core vulnerabilities were exploited prior to patch deployment, indicating a gap between initial compromise and public response. Apple has not stated whether all impacted users have been identified or remediated post-exploitation.
Looking beyond these CVEs, scrutiny around WebKit’s monolithic architecture persists. While these emergency patches close specific attack windows, the underlying complexity of WebKit presents an ongoing surface for adversaries. Further updates will likely tackle deeper architectural weaknesses not solved by hotfixes.
WebKit zero-day vulnerabilities allow threat actors to install malicious code without permission, often requiring no user interaction. As soon as Apple releases a security update, install it. To check for updates:
Don’t postpone. These updates contain patches that neutralize actively exploited vulnerabilities.
When a security update isn’t yet available for your device, or hasn't been applied, consider halting Safari use. Since WebKit powers Safari and many web-enabled apps, using an alternative browser that doesn’t rely on WebKit reduces exposure.
Disabling Safari from the Home Screen is possible via Screen Time settings, limiting accidental use.
WebKit vulnerabilities are commonly exploited via malicious links—often embedded in email, text messages, or on hijacked websites. The risk escalates when visiting unfamiliar sites or clicking links with shortened URLs or suspicious destinations.
The fewer unnecessary sites you visit, the narrower your attack surface becomes. This single behavioral shift disrupts a wide array of exploit attempts.
Notice unanticipated battery drain? Unfamiliar app behavior? Increased device temperature? These could indicate malicious activity following a zero-day exploit. While not conclusive alone, such signs—especially if they appear after visiting a suspicious website—warrant immediate attention.
Many third-party apps use WebKit-based views. Limit which apps have access to photos, location data, and microphone. Go to:
Restricting app-level data exposure narrows the scope of damage even if exploitation occurs.
Apple's response timeline for patching the WebKit zero-day vulnerabilities has come under harsh criticism from security researchers and industry analysts. While these flaws were actively exploited in the wild, Apple took several weeks to issue fixes across all supported devices. Attackers were documented leveraging the vulnerabilities while users awaited crucial security updates.
According to Citizen Lab and Google's Threat Analysis Group, some of the targeted zero-days were being exploited well before Apple released public patches. The lag created a critical exposure window—users assumed system integrity while silent exploits remained operational under the radar.
Apple maintains a tightly controlled disclosure process. Unlike many tech companies that publish early warnings or share vulnerability details with cybersecurity partners, Apple provides limited information until patches are released. This approach frustrates researchers who advocate for coordinated disclosure practices, where developers and the public can prepare before exploits reach mass deployment.
Security experts argue that this opacity endangers high-risk users, such as journalists, activists, and public officials, who depend on detailed threat intelligence to secure their digital lives. Without early visibility, these groups face elevated risk when threat actors deploy malware rooted in undisclosed vulnerabilities.
Apple’s software update mechanism is highly centralized. While this control allows for global rollout coordination, it also means users cannot access partial or beta patches to secure themselves sooner. In contrast, open-source ecosystems often allow for community-driven forks or preliminary mitigations. iOS and macOS users must wait for Apple’s official release, whether a fix is urgent or not.
This closed-loop structure restricts flexibility. It also limits the scope for independent security enhancements, since only Apple can distribute and authorize updates on its platforms.
Looking beyond Apple, Android—particularly through Google's Pixel line—operates under the Android Security Bulletin framework. Vulnerabilities are disclosed monthly, with detailed CVE documentation and coordinated updates across OEMs. Google also collaborates with Project Zero, maintaining a strict 90-day disclosure deadline for vendors who do not patch promptly.
Microsoft's Windows security team opts for "Patch Tuesday," offering a predictable update cadence with advance notifications for IT teams. This industry standard provides a clear roadmap and allows system administrators to prepare for deployments.
In contrast, Apple provides neither a predictable release schedule nor consistent pre-patch information. This unpredictability complicates incident response planning for enterprises and undermines real-time threat assessments for cybersecurity professionals.
As zero-day attacks grow increasingly targeted and complex, the broader cybersecurity community is placing mounting pressure on Apple to modernize its update strategies. The WebKit exploit chain exposed not just technical gaps, but systemic issues in how the company handles digital risk.
Security researchers operate on the frontline of defense against digital threats. By uncovering zero-day vulnerabilities—flaws unknown to the software vendor—they disrupt potential attack chains before threat actors can leverage them. In the case of WebKit, which functions as the core browsing engine in Safari and many parts of Apple’s ecosystem, even a minor exploit can cascade into full-device compromise. Researchers identify these flaws through advanced reverse engineering, fuzz testing, dynamic analysis, and manual code review.
Their methodology combines technical expertise with a fundamentally ethical goal: to notify vendors and contribute fixes before vulnerabilities are exploited in the wild. The process they follow—termed responsible disclosure—ensures transparent, collaborative remediation without exposing end users to unnecessary risk.
Apple launched its public bug bounty program in 2016, expanding eligibility to include iOS, iPadOS, macOS, watchOS, and tvOS. However, security professionals have voiced consistent frustrations with the company's payout structure, communication delays, and lack of transparency.
Responsible disclosure isn't just a courtesy—it's a critical infrastructure mechanism. When researchers submit zero-day details directly to the vendor, rather than selling them on the black market or disclosing publicly before a fix is available, the result is stronger digital safety for millions.
In practical terms, following responsible disclosure protocols enables platform owners to deploy mitigation measures, security patches, or complete code rewrites as needed. Without it, attackers gain an asymmetric advantage, often exploiting flaws for months—known as N-days—before the vendor or public is even aware.
Consider this: Would a security ecosystem without disclosure pipelines collapse under growing threats? Past incidents suggest yes. The explosive spread of the EternalBlue exploit, which fed the WannaCry outbreak in 2017, traces back to an unpatched vulnerability leaked from the NSA. The absence of timely coordinated disclosure enables exactly that kind of scenario.
Security researchers need viable pathways to work with vendors—not just in theory, but with clear incentives, timely communication, and respectful engagement. Strengthening these relationships directly enhances national cybersecurity postures and protects critical infrastructure.
Apple’s recurring battles with WebKit vulnerabilities reveal a foundational issue in the company’s security architecture. WebKit, as the underlying engine powering Safari and embedded web views across iOS and macOS, continues to attract high-level attackers. Each zero-day marks another reminder that software architecture choices made over a decade ago still echo across the company’s most advanced devices.
In 2023 alone, Apple disclosed 20 zero-day vulnerabilities actively exploited in the wild. Nearly half involved WebKit. CVE-2023-32439 and CVE-2023-23529, both disclosed within months of each other, enabled arbitrary code execution via malicious content — an exploit chain prized by spyware groups and state-sponsored actors. Systems as recent as iOS 16.5 and macOS Ventura shipped with these flaws undetected.
A security model that relies heavily on reactive patching after exploitation offers diminishing returns. Real-time threat monitoring, endpoint-level behavioral detection, and hardened browser isolation layers must emerge as core features—not optional extras. These changes won't come from hardware innovation alone. They require engineering transparency and architectural compromises that Apple has historically resisted.
Apple must also close communication gaps. Security advisories often arrive too late or lack technical specificity. Developers, enterprises, and researchers need detailed and timely vulnerability data to update defenses and analyze risk exposure. Vague messaging creates perception gaps, which threat actors exploit just as easily as software bugs.
Apple users shoulder some of the burden as well. When patches drop, install them without delay. Passive update habits and legacy device use widen the threat surface for everyone.
