CVE-2023-40395: An app may be able to access contacts in Apple iOS and iPadOS
The issue was addressed with improved handling of caches. This issue is fixed in tvOS 17, iOS 16.7 and iPadOS 16.7, macOS Monterey 12.7, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to access contacts.
AI Analysis
Technical Summary
CVE-2023-40395 is a security vulnerability identified in Apple’s iOS and iPadOS platforms, as well as related operating systems such as tvOS, macOS Monterey, watchOS, and their recent versions. The root cause of the vulnerability lies in improper handling of caches related to contact data, which allows a malicious application to access the contacts stored on the device without proper authorization. This flaw could be exploited by an attacker who manages to get a malicious app installed on a victim’s device, potentially bypassing the usual permission checks that protect user contact information. Apple addressed this issue by improving cache handling mechanisms in the affected operating systems, releasing patches in versions iOS 16.7, iPadOS 16.7, tvOS 17, macOS Monterey 12.7, watchOS 10, iOS 17, iPadOS 17, and macOS Sonoma 14. The vulnerability does not require user interaction beyond app installation, making it easier to exploit if a malicious app is installed. There are no reports of active exploitation in the wild at the time of disclosure. The vulnerability primarily threatens user privacy by exposing sensitive contact information, which could be leveraged for social engineering, phishing, or further targeted attacks. Since the vulnerability affects a broad range of Apple operating systems widely used in both consumer and enterprise environments, it represents a significant privacy risk if left unpatched.
Potential Impact
For European organizations, the impact of CVE-2023-40395 can be substantial, especially for those relying heavily on Apple devices for business communications and operations. Unauthorized access to contacts can lead to privacy violations under the GDPR, potentially resulting in regulatory fines and reputational damage. Exposure of contact data can facilitate spear-phishing campaigns, social engineering attacks, and unauthorized data harvesting, increasing the risk of broader compromise. Organizations in sectors such as finance, healthcare, legal, and government are particularly at risk due to the sensitivity of their contact databases. The vulnerability could also undermine trust in corporate mobile device management (MDM) policies and complicate compliance efforts. Since the vulnerability affects multiple Apple platforms, organizations with diverse Apple device deployments must ensure comprehensive patching to mitigate risk. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers may develop exploits targeting this vulnerability in the future.
Mitigation Recommendations
European organizations should immediately verify the deployment of Apple devices running affected operating system versions and prioritize updating to the patched versions: iOS 16.7 or later, iPadOS 16.7 or later, tvOS 17 or later, macOS Monterey 12.7 or later, watchOS 10 or later, iOS 17, iPadOS 17, and macOS Sonoma 14. Enforce strict app installation policies through MDM solutions to limit installation of untrusted or unauthorized applications, reducing the risk of malicious apps exploiting this vulnerability. Conduct regular audits of installed applications and revoke permissions for apps that do not require access to contacts. Educate users about the risks of installing apps from untrusted sources and encourage reporting of suspicious app behavior. Implement network-level monitoring for unusual data exfiltration patterns that may indicate exploitation attempts. Consider deploying endpoint detection and response (EDR) tools capable of identifying anomalous access to contact data. Finally, maintain an up-to-date inventory of devices and OS versions to ensure timely patch management and compliance with privacy regulations.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium, Poland, Ireland
CVE-2023-40395: An app may be able to access contacts in Apple iOS and iPadOS
Description
The issue was addressed with improved handling of caches. This issue is fixed in tvOS 17, iOS 16.7 and iPadOS 16.7, macOS Monterey 12.7, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to access contacts.
AI-Powered Analysis
Technical Analysis
CVE-2023-40395 is a security vulnerability identified in Apple’s iOS and iPadOS platforms, as well as related operating systems such as tvOS, macOS Monterey, watchOS, and their recent versions. The root cause of the vulnerability lies in improper handling of caches related to contact data, which allows a malicious application to access the contacts stored on the device without proper authorization. This flaw could be exploited by an attacker who manages to get a malicious app installed on a victim’s device, potentially bypassing the usual permission checks that protect user contact information. Apple addressed this issue by improving cache handling mechanisms in the affected operating systems, releasing patches in versions iOS 16.7, iPadOS 16.7, tvOS 17, macOS Monterey 12.7, watchOS 10, iOS 17, iPadOS 17, and macOS Sonoma 14. The vulnerability does not require user interaction beyond app installation, making it easier to exploit if a malicious app is installed. There are no reports of active exploitation in the wild at the time of disclosure. The vulnerability primarily threatens user privacy by exposing sensitive contact information, which could be leveraged for social engineering, phishing, or further targeted attacks. Since the vulnerability affects a broad range of Apple operating systems widely used in both consumer and enterprise environments, it represents a significant privacy risk if left unpatched.
Potential Impact
For European organizations, the impact of CVE-2023-40395 can be substantial, especially for those relying heavily on Apple devices for business communications and operations. Unauthorized access to contacts can lead to privacy violations under the GDPR, potentially resulting in regulatory fines and reputational damage. Exposure of contact data can facilitate spear-phishing campaigns, social engineering attacks, and unauthorized data harvesting, increasing the risk of broader compromise. Organizations in sectors such as finance, healthcare, legal, and government are particularly at risk due to the sensitivity of their contact databases. The vulnerability could also undermine trust in corporate mobile device management (MDM) policies and complicate compliance efforts. Since the vulnerability affects multiple Apple platforms, organizations with diverse Apple device deployments must ensure comprehensive patching to mitigate risk. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers may develop exploits targeting this vulnerability in the future.
Mitigation Recommendations
European organizations should immediately verify the deployment of Apple devices running affected operating system versions and prioritize updating to the patched versions: iOS 16.7 or later, iPadOS 16.7 or later, tvOS 17 or later, macOS Monterey 12.7 or later, watchOS 10 or later, iOS 17, iPadOS 17, and macOS Sonoma 14. Enforce strict app installation policies through MDM solutions to limit installation of untrusted or unauthorized applications, reducing the risk of malicious apps exploiting this vulnerability. Conduct regular audits of installed applications and revoke permissions for apps that do not require access to contacts. Educate users about the risks of installing apps from untrusted sources and encourage reporting of suspicious app behavior. Implement network-level monitoring for unusual data exfiltration patterns that may indicate exploitation attempts. Consider deploying endpoint detection and response (EDR) tools capable of identifying anomalous access to contact data. Finally, maintain an up-to-date inventory of devices and OS versions to ensure timely patch management and compliance with privacy regulations.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apple
- Date Reserved
- 2023-08-14T20:26:36.253Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 690a53282a90255b94da6783
Added to database: 11/4/2025, 7:25:28 PM
Last enriched: 11/4/2025, 7:36:33 PM
Last updated: 11/5/2025, 8:58:30 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-10622: Client-Side Enforcement of Server-Side Security in Red Hat Red Hat Satellite 6.18 for RHEL 9
HighCVE-2025-12677: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in mykiot KiotViet Sync
MediumCVE-2025-12676: CWE-259 Use of Hard-coded Password in mykiot KiotViet Sync
MediumCVE-2025-12675: CWE-862 Missing Authorization in mykiot KiotViet Sync
MediumCVE-2025-12674: CWE-434 Unrestricted Upload of File with Dangerous Type in mykiot KiotViet Sync
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.