CVE-2024-23210: An app may be able to view a user's phone number in system logs in Apple iOS and iPadOS
This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Sonoma 14.3, watchOS 10.3, tvOS 17.3, iOS 17.3 and iPadOS 17.3. An app may be able to view a user's phone number in system logs.
AI Analysis
Technical Summary
CVE-2024-23210 is a vulnerability identified in Apple iOS and iPadOS operating systems, where an application may be able to access a user's phone number by reading system logs. This issue arises due to insufficient redaction of sensitive information in system logs, allowing potentially unauthorized apps to extract personally identifiable information (PII) such as the phone number. The vulnerability affects multiple Apple platforms, including iOS, iPadOS, macOS Sonoma 14.3, watchOS 10.3, and tvOS 17.3, with the fix implemented in these versions by improving the redaction process to prevent sensitive data exposure. The CVSS 3.1 base score is 3.3, indicating a low severity level. The attack vector is local (AV:L), requiring local access to the device, no privileges required (PR:N), but user interaction is necessary (UI:R). The vulnerability impacts confidentiality only (C:L), with no effect on integrity or availability. The weakness is classified under CWE-532, which relates to exposure of sensitive information in logs. There are no known exploits in the wild at this time. The vulnerability primarily concerns privacy and data leakage rather than system compromise or denial of service.
Potential Impact
For European organizations, the exposure of phone numbers through system logs can lead to privacy violations and potential non-compliance with data protection regulations such as the GDPR. Phone numbers are considered personal data, and unauthorized access or leakage could result in reputational damage, regulatory fines, and loss of customer trust. While the vulnerability does not allow for system compromise or data manipulation, the leakage of phone numbers could facilitate targeted phishing, social engineering, or identity theft attacks against employees or customers. Organizations relying on Apple devices for communication or mobile workforce management should be aware of this risk. The impact is more pronounced in sectors handling sensitive communications, such as finance, healthcare, and government, where phone numbers may be linked to critical accounts or services.
Mitigation Recommendations
European organizations should ensure that all Apple devices are updated to the fixed versions: iOS 17.3, iPadOS 17.3, macOS Sonoma 14.3, watchOS 10.3, and tvOS 17.3 or later. Device management policies should enforce timely patching and updates. Additionally, organizations should audit installed applications to limit the installation of untrusted or unnecessary apps that could exploit this vulnerability. Employ Mobile Device Management (MDM) solutions to restrict app permissions and monitor app behavior. Educate users about the risks of installing apps from unverified sources and the importance of applying system updates promptly. For highly sensitive environments, consider restricting local access to devices and implementing additional logging and monitoring to detect unusual access patterns to system logs. Finally, review and enhance data privacy policies to address potential leakage of personal information through logs.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium, Poland, Ireland
CVE-2024-23210: An app may be able to view a user's phone number in system logs in Apple iOS and iPadOS
Description
This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Sonoma 14.3, watchOS 10.3, tvOS 17.3, iOS 17.3 and iPadOS 17.3. An app may be able to view a user's phone number in system logs.
AI-Powered Analysis
Technical Analysis
CVE-2024-23210 is a vulnerability identified in Apple iOS and iPadOS operating systems, where an application may be able to access a user's phone number by reading system logs. This issue arises due to insufficient redaction of sensitive information in system logs, allowing potentially unauthorized apps to extract personally identifiable information (PII) such as the phone number. The vulnerability affects multiple Apple platforms, including iOS, iPadOS, macOS Sonoma 14.3, watchOS 10.3, and tvOS 17.3, with the fix implemented in these versions by improving the redaction process to prevent sensitive data exposure. The CVSS 3.1 base score is 3.3, indicating a low severity level. The attack vector is local (AV:L), requiring local access to the device, no privileges required (PR:N), but user interaction is necessary (UI:R). The vulnerability impacts confidentiality only (C:L), with no effect on integrity or availability. The weakness is classified under CWE-532, which relates to exposure of sensitive information in logs. There are no known exploits in the wild at this time. The vulnerability primarily concerns privacy and data leakage rather than system compromise or denial of service.
Potential Impact
For European organizations, the exposure of phone numbers through system logs can lead to privacy violations and potential non-compliance with data protection regulations such as the GDPR. Phone numbers are considered personal data, and unauthorized access or leakage could result in reputational damage, regulatory fines, and loss of customer trust. While the vulnerability does not allow for system compromise or data manipulation, the leakage of phone numbers could facilitate targeted phishing, social engineering, or identity theft attacks against employees or customers. Organizations relying on Apple devices for communication or mobile workforce management should be aware of this risk. The impact is more pronounced in sectors handling sensitive communications, such as finance, healthcare, and government, where phone numbers may be linked to critical accounts or services.
Mitigation Recommendations
European organizations should ensure that all Apple devices are updated to the fixed versions: iOS 17.3, iPadOS 17.3, macOS Sonoma 14.3, watchOS 10.3, and tvOS 17.3 or later. Device management policies should enforce timely patching and updates. Additionally, organizations should audit installed applications to limit the installation of untrusted or unnecessary apps that could exploit this vulnerability. Employ Mobile Device Management (MDM) solutions to restrict app permissions and monitor app behavior. Educate users about the risks of installing apps from unverified sources and the importance of applying system updates promptly. For highly sensitive environments, consider restricting local access to devices and implementing additional logging and monitoring to detect unusual access patterns to system logs. Finally, review and enhance data privacy policies to address potential leakage of personal information through logs.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- apple
- Date Reserved
- 2024-01-12T22:22:21.476Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68406659182aa0cae2b37ac3
Added to database: 6/4/2025, 3:29:29 PM
Last enriched: 7/6/2025, 7:39:56 AM
Last updated: 7/31/2025, 3:06:48 PM
Views: 11
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.