CVE-2024-23240: Shake-to-undo may allow a deleted photo to be re-surfaced without authentication in Apple iOS and iPadOS
The issue was addressed with improved checks. This issue is fixed in iOS 17.4 and iPadOS 17.4. Shake-to-undo may allow a deleted photo to be re-surfaced without authentication.
AI Analysis
Technical Summary
CVE-2024-23240 is a vulnerability identified in Apple’s iOS and iPadOS operating systems related to the 'shake-to-undo' feature, which allows users to undo recent actions by physically shaking their device. The flaw permits a deleted photo to be re-surfaced or temporarily restored without requiring any form of user authentication, potentially exposing deleted content unintentionally. This occurs because the system did not enforce sufficient checks to verify user authorization before allowing the undo action to restore deleted photos. The vulnerability affects versions prior to iOS and iPadOS 17.4, where Apple has implemented improved validation mechanisms to prevent unauthorized re-surfacing of deleted photos. The CVSS v3.1 base score is 2.4, reflecting a low severity primarily due to the limited impact on confidentiality and availability, no privileges required, and no user interaction needed. The attack vector is physical proximity (local), as the attacker must be able to trigger the shake-to-undo gesture on the device. There are no known exploits in the wild, and the vulnerability mainly impacts the integrity of deleted photo data by allowing it to be restored without authentication. This flaw could be exploited by someone with physical access to the device to view deleted photos that should otherwise remain inaccessible.
Potential Impact
For European organizations, the impact of CVE-2024-23240 is relatively low but not negligible. The vulnerability could lead to unauthorized access to deleted photos on corporate or personal Apple devices used within the organization, potentially exposing sensitive or confidential images. This could have privacy implications, especially for sectors handling sensitive personal data such as healthcare, legal, or financial services. However, the lack of impact on confidentiality of other data, absence of remote exploitation, and no availability disruption limits the overall risk. The threat is primarily relevant in scenarios where devices are physically accessible to unauthorized individuals, such as lost or stolen devices or shared work environments. Organizations with mobile workforces relying heavily on Apple iPhones and iPads should be aware of this risk, particularly if device encryption and authentication controls are circumvented by this vulnerability. Prompt patching reduces the risk significantly.
Mitigation Recommendations
To mitigate CVE-2024-23240, European organizations should: 1) Ensure all iOS and iPadOS devices are updated to version 17.4 or later, where the vulnerability is fixed. 2) Enforce strict physical security policies to prevent unauthorized physical access to devices, including use of strong passcodes and biometric authentication. 3) Educate users about the risks of leaving devices unattended and the importance of locking devices immediately when not in use. 4) Consider disabling the shake-to-undo feature via device management policies if feasible, especially on devices handling highly sensitive data. 5) Implement mobile device management (MDM) solutions to enforce security configurations and monitor device compliance. 6) Regularly audit device security posture and incident response plans to address potential data exposure from physical device compromise. These steps go beyond generic advice by focusing on physical security controls and feature-specific mitigations.
Affected Countries
United Kingdom, Germany, France, Italy, Spain, Netherlands, Sweden, Belgium, Ireland, Denmark
CVE-2024-23240: Shake-to-undo may allow a deleted photo to be re-surfaced without authentication in Apple iOS and iPadOS
Description
The issue was addressed with improved checks. This issue is fixed in iOS 17.4 and iPadOS 17.4. Shake-to-undo may allow a deleted photo to be re-surfaced without authentication.
AI-Powered Analysis
Technical Analysis
CVE-2024-23240 is a vulnerability identified in Apple’s iOS and iPadOS operating systems related to the 'shake-to-undo' feature, which allows users to undo recent actions by physically shaking their device. The flaw permits a deleted photo to be re-surfaced or temporarily restored without requiring any form of user authentication, potentially exposing deleted content unintentionally. This occurs because the system did not enforce sufficient checks to verify user authorization before allowing the undo action to restore deleted photos. The vulnerability affects versions prior to iOS and iPadOS 17.4, where Apple has implemented improved validation mechanisms to prevent unauthorized re-surfacing of deleted photos. The CVSS v3.1 base score is 2.4, reflecting a low severity primarily due to the limited impact on confidentiality and availability, no privileges required, and no user interaction needed. The attack vector is physical proximity (local), as the attacker must be able to trigger the shake-to-undo gesture on the device. There are no known exploits in the wild, and the vulnerability mainly impacts the integrity of deleted photo data by allowing it to be restored without authentication. This flaw could be exploited by someone with physical access to the device to view deleted photos that should otherwise remain inaccessible.
Potential Impact
For European organizations, the impact of CVE-2024-23240 is relatively low but not negligible. The vulnerability could lead to unauthorized access to deleted photos on corporate or personal Apple devices used within the organization, potentially exposing sensitive or confidential images. This could have privacy implications, especially for sectors handling sensitive personal data such as healthcare, legal, or financial services. However, the lack of impact on confidentiality of other data, absence of remote exploitation, and no availability disruption limits the overall risk. The threat is primarily relevant in scenarios where devices are physically accessible to unauthorized individuals, such as lost or stolen devices or shared work environments. Organizations with mobile workforces relying heavily on Apple iPhones and iPads should be aware of this risk, particularly if device encryption and authentication controls are circumvented by this vulnerability. Prompt patching reduces the risk significantly.
Mitigation Recommendations
To mitigate CVE-2024-23240, European organizations should: 1) Ensure all iOS and iPadOS devices are updated to version 17.4 or later, where the vulnerability is fixed. 2) Enforce strict physical security policies to prevent unauthorized physical access to devices, including use of strong passcodes and biometric authentication. 3) Educate users about the risks of leaving devices unattended and the importance of locking devices immediately when not in use. 4) Consider disabling the shake-to-undo feature via device management policies if feasible, especially on devices handling highly sensitive data. 5) Implement mobile device management (MDM) solutions to enforce security configurations and monitor device compliance. 6) Regularly audit device security posture and incident response plans to address potential data exposure from physical device compromise. These steps go beyond generic advice by focusing on physical security controls and feature-specific mitigations.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apple
- Date Reserved
- 2024-01-12T22:22:21.481Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a47506d939959c8022695
Added to database: 11/4/2025, 6:34:56 PM
Last enriched: 11/4/2025, 9:29:04 PM
Last updated: 12/15/2025, 3:28:34 PM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-34412: CWE-693 Protection Mechanism Failure in EQS Group GmbH Convercent Whistleblowing Platform
MediumCVE-2025-34411: CWE-862 Missing Authorization in EQS Group GmbH Convercent Whistleblowing Platform
MediumCVE-2025-34181: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in NetSupport Software Manager
HighCVE-2025-34180: CWE-257 Storing Passwords in a Recoverable Format in NetSupport Software Manager
HighCVE-2025-34179: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in NetSupport Software Manager
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.