Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-23204: A shortcut may be able to use sensitive data with certain actions without prompting the user in Apple iOS and iPadOS

0
High
VulnerabilityCVE-2024-23204cvecve-2024-23204
Published: Tue Jan 23 2024 (01/23/2024, 00:25:30 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

CVE-2024-23204 is a vulnerability in Apple iOS, iPadOS, and watchOS where a shortcut may use sensitive data with certain actions without prompting the user. This issue was addressed by Apple through additional permissions checks and is fixed in iOS 16. 7. 6, iPadOS 16. 7. 6, iOS 17. 3, iPadOS 17. 3, macOS Monterey 12. 7. 4, macOS Sonoma 14.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/09/2026, 22:56:50 UTC

Technical Analysis

CVE-2024-23204 affects Apple iOS, iPadOS, and watchOS platforms, where a shortcut may be able to access sensitive data using certain actions without prompting the user for permission. This behavior violates expected user consent mechanisms for sensitive data access. The vulnerability was mitigated by Apple through the implementation of additional permissions checks in the affected operating systems. The fix is included in iOS 16.7.6, iPadOS 16.7.6, iOS 17.3, iPadOS 17.3, macOS Monterey 12.7.4, macOS Sonoma 14.3, macOS Ventura 13.6.5, and watchOS 10.3. The CVSS v3.1 base score is 7.5, indicating a high severity vulnerability with network attack vector, low attack complexity, no privileges required, no user interaction, unchanged scope, and high confidentiality impact but no integrity or availability impact.

Potential Impact

An attacker leveraging this vulnerability could cause a shortcut to access sensitive user data without the user being prompted for permission. This could lead to unauthorized disclosure of sensitive information. The vulnerability does not impact integrity or availability but has a high confidentiality impact. There are no known exploits in the wild at this time.

Mitigation Recommendations

Apple has released official patches that address this vulnerability by adding additional permissions checks. Users and administrators should update affected Apple devices to iOS 16.7.6, iPadOS 16.7.6, iOS 17.3, iPadOS 17.3, macOS Monterey 12.7.4, macOS Sonoma 14.3, macOS Ventura 13.6.5, and watchOS 10.3 or later to remediate this issue. Applying these updates will ensure the vulnerability is fixed and no further action is required.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
apple
Date Reserved
2024-01-12T22:22:21.475Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6839c41d182aa0cae2b435ef

Added to database: 5/30/2025, 2:43:41 PM

Last enriched: 4/9/2026, 10:56:50 PM

Last updated: 5/9/2026, 6:21:16 AM

Views: 73

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses