PatchSiren

PatchSiren cyber security CVE debrief

CVE-2017-2359 Apple CVE debrief

CVE-2017-2359 is a Safari spoofing issue in Apple products. NVD lists Safari versions through 10.0.2 as affected, and the flaw could be triggered by a crafted website to spoof the address bar. Apple’s advisory HT207484 is referenced as the vendor fix notice.

Vendor
Apple
Product
CVE-2017-2359
CVSS
MEDIUM 6.5
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-20
Original CVE updated
2026-05-13
Advisory published
2017-02-20
Advisory updated
2026-05-13

Who should care

Organizations and users still running Safari 10.0.2 or earlier, especially on legacy Apple systems, should care because the issue can mislead users into trusting a deceptive webpage.

Technical summary

The vulnerability is a browser UI spoofing problem in Safari. The NVD record shows a network-exploitable issue with user interaction required (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N). The primary impact is integrity: a crafted webpage may visually impersonate the browser’s address bar, which can support phishing or other user-deception attacks. The vulnerable range is Safari before 10.0.3, with the NVD CPE criteria ending at 10.0.2.

Defensive priority

Medium. Prioritize patching any still-supported or legacy systems running Safari 10.0.2 or earlier, but this is not marked as an exploited or ransomware-linked issue in the supplied sources.

Recommended defensive actions

  • Update Safari to version 10.0.3 or later on affected Apple systems.
  • Verify legacy or long-lived devices are not pinned to Safari 10.0.2 or earlier.
  • Use browser and user-training controls to reduce susceptibility to address-bar spoofing and phishing.
  • Confirm Apple security advisories such as HT207484 are reflected in your patch management records.

Evidence notes

The debrief is based on the supplied CVE description and NVD metadata. NVD lists Safari before 10.0.3 as affected, with CPE version range ending in 10.0.2, and provides the CVSS vector CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N. The supplied references include Apple’s HT207484 advisory as the vendor fix reference. No exploit code or unsupported details were used.

Official resources

Published by CVE/NVD on 2017-02-20. The supplied timeline does not indicate KEV listing or ransomware association.