Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-23204: A shortcut may be able to use sensitive data with certain actions without prompting the user in Apple iOS and iPadOS

0
High
VulnerabilityCVE-2024-23204cvecve-2024-23204
Published: Tue Jan 23 2024 (01/23/2024, 00:25:30 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

The issue was addressed with additional permissions checks. This issue is fixed in macOS Sonoma 14.3, watchOS 10.3, iOS 17.3 and iPadOS 17.3. A shortcut may be able to use sensitive data with certain actions without prompting the user.

AI-Powered Analysis

AILast updated: 11/05/2025, 00:01:27 UTC

Technical Analysis

CVE-2024-23204 is a vulnerability in Apple iOS and iPadOS that allows a shortcut to access sensitive data without prompting the user for permission. Shortcuts are automated workflows that users can create or download to perform tasks on their devices. Normally, when a shortcut attempts to access sensitive data, iOS and iPadOS prompt the user to grant permission, ensuring user consent and preventing unauthorized access. However, due to insufficient permission checks in affected versions, a malicious or crafted shortcut can bypass these prompts and access sensitive data silently. This flaw affects iOS and iPadOS versions prior to 17.3, as Apple addressed the issue by implementing additional permission checks in iOS 17.3 and iPadOS 17.3, as well as macOS Sonoma 14.3 and watchOS 10.3. The vulnerability has a CVSS 3.1 base score of 7.5, indicating high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), and no impact on integrity or availability (I:N/A:N). This means an attacker can exploit the vulnerability remotely without any authentication or user interaction to access sensitive data, potentially leading to data leakage. There are currently no known exploits in the wild. The vulnerability is particularly concerning because it undermines the security model of user consent for data access on Apple devices, potentially exposing personal or corporate sensitive information to malicious shortcuts.

Potential Impact

For European organizations, this vulnerability poses a significant risk to data confidentiality on Apple mobile devices. Many enterprises and government agencies in Europe rely on iOS and iPadOS devices for communication, productivity, and sensitive operations. An attacker exploiting this flaw could silently extract sensitive data such as contacts, location, messages, or corporate credentials without user knowledge, leading to data breaches, loss of privacy, and potential regulatory non-compliance under GDPR. The lack of user interaction or authentication required for exploitation increases the attack surface, especially in environments where users install shortcuts from untrusted sources or where device management policies are lax. This could impact sectors including finance, healthcare, government, and critical infrastructure where sensitive data protection is paramount. Additionally, the vulnerability could be leveraged in targeted attacks or espionage campaigns against high-value European targets using Apple devices. Although no exploits are currently known in the wild, the ease of exploitation and high confidentiality impact necessitate urgent attention.

Mitigation Recommendations

European organizations should immediately prioritize updating all affected Apple devices to iOS 17.3, iPadOS 17.3, macOS Sonoma 14.3, and watchOS 10.3 or later to apply the security fixes. Beyond patching, organizations should audit and restrict the use of shortcuts, especially those obtained from untrusted sources, by implementing mobile device management (MDM) policies that control shortcut installation and execution. User training should emphasize the risks of installing shortcuts from unknown developers. Additionally, monitoring device logs for unusual shortcut activity can help detect exploitation attempts. Organizations should enforce strict app and shortcut permission policies and consider disabling shortcuts entirely on devices handling highly sensitive data if feasible. Regular security assessments and penetration testing focusing on shortcut-related attack vectors can further reduce risk. Finally, integrating endpoint detection and response (EDR) solutions capable of monitoring iOS/iPadOS behaviors may provide early warning of exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
apple
Date Reserved
2024-01-12T22:22:21.475Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6839c41d182aa0cae2b435ef

Added to database: 5/30/2025, 2:43:41 PM

Last enriched: 11/5/2025, 12:01:27 AM

Last updated: 12/3/2025, 5:07:37 PM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats