Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-23210: An app may be able to view a user's phone number in system logs in Apple iOS and iPadOS

0
Low
VulnerabilityCVE-2024-23210cvecve-2024-23210
Published: Tue Jan 23 2024 (01/23/2024, 00:25:23 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Sonoma 14.3, watchOS 10.3, tvOS 17.3, iOS 17.3 and iPadOS 17.3. An app may be able to view a user's phone number in system logs.

AI-Powered Analysis

AILast updated: 11/05/2025, 00:02:42 UTC

Technical Analysis

CVE-2024-23210 is a vulnerability identified in Apple’s iOS and iPadOS platforms, as well as related operating systems such as macOS Sonoma, watchOS, and tvOS. The core issue stems from insufficient redaction of sensitive information in system logs, allowing an application to potentially access a user’s phone number. This leakage occurs because system logs, which are intended to record system events and errors, inadvertently include personally identifiable information (PII) that should have been masked or removed. The vulnerability falls under CWE-532, which relates to exposure of sensitive information through logs. The flaw requires an app to have local access to the device and some level of user interaction to trigger the logging event that exposes the phone number. The CVSS 3.1 vector (AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N) indicates that the attack vector is local, with low complexity, no privileges required, but user interaction is necessary. The impact is limited to confidentiality, with no effect on integrity or availability. Apple addressed this issue by enhancing the redaction mechanisms in system logs, releasing patches in version 17.3 for iOS, iPadOS, macOS Sonoma, watchOS, and tvOS. There are no known exploits in the wild, and the affected versions are unspecified but presumably all versions prior to 17.3. This vulnerability highlights the importance of careful handling of sensitive data in system diagnostics and logging.

Potential Impact

For European organizations, the primary impact of CVE-2024-23210 is the potential exposure of users’ phone numbers to unauthorized applications on Apple devices. This can lead to privacy violations, targeted phishing attacks, or social engineering campaigns leveraging the leaked phone numbers. While the vulnerability does not allow modification of data or disruption of services, the confidentiality breach could undermine user trust and violate data protection regulations such as GDPR, which mandates strict controls over personal data. Organizations relying heavily on Apple devices for communication or mobile workforce management may face increased risk if devices are not updated promptly. The risk is particularly relevant for sectors handling sensitive customer or employee data, such as finance, healthcare, and government agencies. However, the requirement for local access and user interaction limits the scope of exploitation, reducing the likelihood of widespread automated attacks.

Mitigation Recommendations

European organizations should prioritize updating all Apple devices to iOS, iPadOS, macOS Sonoma, watchOS, and tvOS version 17.3 or later, where the vulnerability is fixed. Device management solutions should enforce mandatory OS updates and restrict installation of untrusted applications to minimize the risk of local exploitation. Monitoring and auditing of app permissions and behaviors can help detect suspicious activities attempting to access system logs. Organizations should educate users about the risks of installing unverified apps and the importance of applying updates promptly. Additionally, reviewing internal policies on logging and data redaction for enterprise apps can prevent similar issues. For highly sensitive environments, consider restricting device usage policies or deploying mobile threat defense solutions that detect anomalous app behavior related to data leakage.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
apple
Date Reserved
2024-01-12T22:22:21.476Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68406659182aa0cae2b37ac3

Added to database: 6/4/2025, 3:29:29 PM

Last enriched: 11/5/2025, 12:02:42 AM

Last updated: 11/30/2025, 3:41:21 PM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats