PatchSiren cyber security CVE debrief
CVE-2017-2359 Apple CVE debrief
CVE-2017-2359 is a Safari spoofing issue in Apple products. NVD lists Safari versions through 10.0.2 as affected, and the flaw could be triggered by a crafted website to spoof the address bar. Apple’s advisory HT207484 is referenced as the vendor fix notice.
- Vendor
- Apple
- Product
- CVE-2017-2359
- CVSS
- MEDIUM 6.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-20
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-20
- Advisory updated
- 2026-05-13
Who should care
Organizations and users still running Safari 10.0.2 or earlier, especially on legacy Apple systems, should care because the issue can mislead users into trusting a deceptive webpage.
Technical summary
The vulnerability is a browser UI spoofing problem in Safari. The NVD record shows a network-exploitable issue with user interaction required (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N). The primary impact is integrity: a crafted webpage may visually impersonate the browser’s address bar, which can support phishing or other user-deception attacks. The vulnerable range is Safari before 10.0.3, with the NVD CPE criteria ending at 10.0.2.
Defensive priority
Medium. Prioritize patching any still-supported or legacy systems running Safari 10.0.2 or earlier, but this is not marked as an exploited or ransomware-linked issue in the supplied sources.
Recommended defensive actions
- Update Safari to version 10.0.3 or later on affected Apple systems.
- Verify legacy or long-lived devices are not pinned to Safari 10.0.2 or earlier.
- Use browser and user-training controls to reduce susceptibility to address-bar spoofing and phishing.
- Confirm Apple security advisories such as HT207484 are reflected in your patch management records.
Evidence notes
The debrief is based on the supplied CVE description and NVD metadata. NVD lists Safari before 10.0.3 as affected, with CPE version range ending in 10.0.2, and provides the CVSS vector CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N. The supplied references include Apple’s HT207484 advisory as the vendor fix reference. No exploit code or unsupported details were used.
Official resources
Published by CVE/NVD on 2017-02-20. The supplied timeline does not indicate KEV listing or ransomware association.