Skip to main content

CVE-2024-23204: A shortcut may be able to use sensitive data with certain actions without prompting the user in Apple iOS and iPadOS

High
VulnerabilityCVE-2024-23204cvecve-2024-23204
Published: Tue Jan 23 2024 (01/23/2024, 00:25:30 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

The issue was addressed with additional permissions checks. This issue is fixed in macOS Sonoma 14.3, watchOS 10.3, iOS 17.3 and iPadOS 17.3. A shortcut may be able to use sensitive data with certain actions without prompting the user.

AI-Powered Analysis

AILast updated: 07/08/2025, 16:59:01 UTC

Technical Analysis

CVE-2024-23204 is a high-severity vulnerability affecting Apple iOS and iPadOS platforms, specifically related to the Shortcuts app functionality. The vulnerability allows a maliciously crafted shortcut to access sensitive data without triggering the usual user consent prompts. Normally, when a shortcut attempts to access sensitive information or perform certain privileged actions, the operating system prompts the user for permission to prevent unauthorized data access. However, due to insufficient permission checks in affected versions of iOS and iPadOS, a shortcut can bypass these prompts and silently access sensitive data. This flaw compromises the confidentiality of user data, as attackers can exploit shortcuts to extract information without user awareness or interaction. The issue was addressed by Apple through additional permission checks implemented in iOS 17.3, iPadOS 17.3, macOS Sonoma 14.3, and watchOS 10.3. The vulnerability has a CVSS v3.1 base score of 7.5, reflecting its high impact on confidentiality with no required privileges or user interaction for exploitation, and network attack vector. There are no known exploits in the wild at the time of publication, but the ease of exploitation and the lack of user prompts make this a significant risk. The vulnerability affects unspecified versions prior to the patched releases, so devices not updated to these versions remain vulnerable. Given the widespread use of iOS and iPadOS devices in both personal and enterprise environments, this vulnerability poses a substantial risk to data privacy and security.

Potential Impact

For European organizations, this vulnerability presents a serious threat to the confidentiality of sensitive corporate and personal data accessed or stored on iOS and iPadOS devices. Many enterprises rely on Apple devices for mobile productivity, secure communications, and access to corporate resources. An attacker exploiting this vulnerability could silently extract sensitive information such as credentials, personal identifiers, or corporate data without user consent or awareness. This could lead to data breaches, regulatory non-compliance (e.g., GDPR violations), and reputational damage. The lack of user interaction requirement means that even non-technical users could be targeted through malicious shortcuts distributed via messaging or email. Additionally, the vulnerability could be leveraged in targeted attacks against high-value individuals or organizations, including government agencies, financial institutions, and healthcare providers across Europe. The potential for silent data exfiltration increases the risk of espionage and intellectual property theft. Since the vulnerability affects mobile devices, it also impacts remote and hybrid work scenarios prevalent in Europe, where secure mobile access is critical.

Mitigation Recommendations

European organizations should prioritize updating all iOS and iPadOS devices to version 17.3 or later as soon as possible to ensure the vulnerability is patched. Beyond patching, organizations should implement strict mobile device management (MDM) policies to control the installation and execution of shortcuts, restricting users from running untrusted or unsigned shortcuts. Security awareness training should educate users about the risks of installing shortcuts from unknown sources and encourage verification of shortcut origins. Network-level protections such as monitoring for unusual data exfiltration patterns from mobile devices can help detect exploitation attempts. Organizations should also review and audit existing shortcuts used in corporate environments to ensure they do not inadvertently expose sensitive data. Employing endpoint detection and response (EDR) solutions capable of monitoring iOS devices can provide additional visibility. Finally, enforcing multi-factor authentication and minimizing sensitive data stored on mobile devices can reduce the impact of potential data leaks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
apple
Date Reserved
2024-01-12T22:22:21.475Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6839c41d182aa0cae2b435ef

Added to database: 5/30/2025, 2:43:41 PM

Last enriched: 7/8/2025, 4:59:01 PM

Last updated: 8/12/2025, 9:00:52 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats