Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-42855: An attacker with physical access may be able to silently persist an Apple ID on an erased device in Apple iOS and iPadOS

0
Medium
VulnerabilityCVE-2023-42855cvecve-2023-42855
Published: Wed Feb 21 2024 (02/21/2024, 06:41:33 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

This issue was addressed with improved state management. This issue is fixed in iOS 17.1 and iPadOS 17.1. An attacker with physical access may be able to silently persist an Apple ID on an erased device.

AI-Powered Analysis

AILast updated: 11/04/2025, 20:16:51 UTC

Technical Analysis

CVE-2023-42855 is a vulnerability identified in Apple iOS and iPadOS that allows an attacker with physical access to a device to silently persist an Apple ID on a device that has been erased. The vulnerability arises from improper state management in the operating system, which could allow an attacker to implant or maintain an Apple ID on a device even after it has been reset to factory settings. This persistence could enable unauthorized access or control over the device, potentially bypassing normal security controls that rely on device erasure to remove user data and credentials. The issue is addressed in iOS and iPadOS 17.1 through improved state management mechanisms that prevent such silent persistence. The CVSS v3.1 base score is 4.6 (medium severity), reflecting that the attack vector requires physical access (AV:P), has low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N, I:N), but causes high impact on availability (A:H). No known exploits have been reported in the wild. This vulnerability primarily affects devices running iOS and iPadOS versions prior to 17.1, with no specific affected versions detailed. The ability to silently persist an Apple ID on an erased device could be leveraged by attackers to maintain long-term access or control, complicating device recovery and security assurance processes.

Potential Impact

For European organizations, this vulnerability poses a risk primarily in environments where Apple iOS and iPadOS devices are widely used, such as in corporate, government, and educational sectors. The ability for an attacker with physical access to persist an Apple ID on an erased device undermines the security assumptions around device wiping and re-provisioning, potentially allowing unauthorized access to corporate resources or sensitive data. This could lead to unauthorized device enrollment, data leakage, or persistent backdoors that evade standard device management and security controls. The impact is heightened in scenarios involving device loss, theft, or improper disposal. Additionally, organizations with Bring Your Own Device (BYOD) policies may face increased risk if devices are not properly updated or physically secured. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact and persistence of unauthorized Apple IDs could disrupt operations and complicate incident response and forensic investigations.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize updating all Apple iOS and iPadOS devices to version 17.1 or later, where the issue is fixed. Implement strict physical security controls to prevent unauthorized physical access to devices, including secure storage, device tracking, and access logging. Enforce policies for device handling, especially during decommissioning or transfer, ensuring devices are updated and securely wiped using trusted methods. Employ Mobile Device Management (MDM) solutions to monitor device compliance and detect anomalies such as unauthorized Apple ID persistence. Educate users and IT staff about the risks of physical access attacks and the importance of timely updates. For high-risk environments, consider additional hardware protections such as secure boot and hardware encryption. Regularly audit device inventories and conduct security assessments to verify that devices are not compromised. Finally, maintain incident response plans that account for potential persistence mechanisms on erased devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2023-09-14T19:05:11.451Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a554ca730e5a3d9d77d17

Added to database: 11/4/2025, 7:34:36 PM

Last enriched: 11/4/2025, 8:16:51 PM

Last updated: 11/5/2025, 2:15:45 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats