CVE-2024-23240: Shake-to-undo may allow a deleted photo to be re-surfaced without authentication in Apple iOS and iPadOS
The issue was addressed with improved checks. This issue is fixed in iOS 17.4 and iPadOS 17.4. Shake-to-undo may allow a deleted photo to be re-surfaced without authentication.
AI Analysis
Technical Summary
CVE-2024-23240 is a vulnerability identified in Apple’s iOS and iPadOS operating systems related to the 'shake-to-undo' feature, which allows users to undo recent actions by physically shaking their device. The flaw permits a deleted photo to be re-surfaced or temporarily restored without requiring any form of user authentication, potentially exposing deleted content unintentionally. This occurs because the system did not enforce sufficient checks to verify user authorization before allowing the undo action to restore deleted photos. The vulnerability affects versions prior to iOS and iPadOS 17.4, where Apple has implemented improved validation mechanisms to prevent unauthorized re-surfacing of deleted photos. The CVSS v3.1 base score is 2.4, reflecting a low severity primarily due to the limited impact on confidentiality and availability, no privileges required, and no user interaction needed. The attack vector is physical proximity (local), as the attacker must be able to trigger the shake-to-undo gesture on the device. There are no known exploits in the wild, and the vulnerability mainly impacts the integrity of deleted photo data by allowing it to be restored without authentication. This flaw could be exploited by someone with physical access to the device to view deleted photos that should otherwise remain inaccessible.
Potential Impact
For European organizations, the impact of CVE-2024-23240 is relatively low but not negligible. The vulnerability could lead to unauthorized access to deleted photos on corporate or personal Apple devices used within the organization, potentially exposing sensitive or confidential images. This could have privacy implications, especially for sectors handling sensitive personal data such as healthcare, legal, or financial services. However, the lack of impact on confidentiality of other data, absence of remote exploitation, and no availability disruption limits the overall risk. The threat is primarily relevant in scenarios where devices are physically accessible to unauthorized individuals, such as lost or stolen devices or shared work environments. Organizations with mobile workforces relying heavily on Apple iPhones and iPads should be aware of this risk, particularly if device encryption and authentication controls are circumvented by this vulnerability. Prompt patching reduces the risk significantly.
Mitigation Recommendations
To mitigate CVE-2024-23240, European organizations should: 1) Ensure all iOS and iPadOS devices are updated to version 17.4 or later, where the vulnerability is fixed. 2) Enforce strict physical security policies to prevent unauthorized physical access to devices, including use of strong passcodes and biometric authentication. 3) Educate users about the risks of leaving devices unattended and the importance of locking devices immediately when not in use. 4) Consider disabling the shake-to-undo feature via device management policies if feasible, especially on devices handling highly sensitive data. 5) Implement mobile device management (MDM) solutions to enforce security configurations and monitor device compliance. 6) Regularly audit device security posture and incident response plans to address potential data exposure from physical device compromise. These steps go beyond generic advice by focusing on physical security controls and feature-specific mitigations.
Affected Countries
United Kingdom, Germany, France, Italy, Spain, Netherlands, Sweden, Belgium, Ireland, Denmark
CVE-2024-23240: Shake-to-undo may allow a deleted photo to be re-surfaced without authentication in Apple iOS and iPadOS
Description
The issue was addressed with improved checks. This issue is fixed in iOS 17.4 and iPadOS 17.4. Shake-to-undo may allow a deleted photo to be re-surfaced without authentication.
AI-Powered Analysis
Technical Analysis
CVE-2024-23240 is a vulnerability identified in Apple’s iOS and iPadOS operating systems related to the 'shake-to-undo' feature, which allows users to undo recent actions by physically shaking their device. The flaw permits a deleted photo to be re-surfaced or temporarily restored without requiring any form of user authentication, potentially exposing deleted content unintentionally. This occurs because the system did not enforce sufficient checks to verify user authorization before allowing the undo action to restore deleted photos. The vulnerability affects versions prior to iOS and iPadOS 17.4, where Apple has implemented improved validation mechanisms to prevent unauthorized re-surfacing of deleted photos. The CVSS v3.1 base score is 2.4, reflecting a low severity primarily due to the limited impact on confidentiality and availability, no privileges required, and no user interaction needed. The attack vector is physical proximity (local), as the attacker must be able to trigger the shake-to-undo gesture on the device. There are no known exploits in the wild, and the vulnerability mainly impacts the integrity of deleted photo data by allowing it to be restored without authentication. This flaw could be exploited by someone with physical access to the device to view deleted photos that should otherwise remain inaccessible.
Potential Impact
For European organizations, the impact of CVE-2024-23240 is relatively low but not negligible. The vulnerability could lead to unauthorized access to deleted photos on corporate or personal Apple devices used within the organization, potentially exposing sensitive or confidential images. This could have privacy implications, especially for sectors handling sensitive personal data such as healthcare, legal, or financial services. However, the lack of impact on confidentiality of other data, absence of remote exploitation, and no availability disruption limits the overall risk. The threat is primarily relevant in scenarios where devices are physically accessible to unauthorized individuals, such as lost or stolen devices or shared work environments. Organizations with mobile workforces relying heavily on Apple iPhones and iPads should be aware of this risk, particularly if device encryption and authentication controls are circumvented by this vulnerability. Prompt patching reduces the risk significantly.
Mitigation Recommendations
To mitigate CVE-2024-23240, European organizations should: 1) Ensure all iOS and iPadOS devices are updated to version 17.4 or later, where the vulnerability is fixed. 2) Enforce strict physical security policies to prevent unauthorized physical access to devices, including use of strong passcodes and biometric authentication. 3) Educate users about the risks of leaving devices unattended and the importance of locking devices immediately when not in use. 4) Consider disabling the shake-to-undo feature via device management policies if feasible, especially on devices handling highly sensitive data. 5) Implement mobile device management (MDM) solutions to enforce security configurations and monitor device compliance. 6) Regularly audit device security posture and incident response plans to address potential data exposure from physical device compromise. These steps go beyond generic advice by focusing on physical security controls and feature-specific mitigations.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apple
- Date Reserved
- 2024-01-12T22:22:21.481Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a47506d939959c8022695
Added to database: 11/4/2025, 6:34:56 PM
Last enriched: 11/4/2025, 9:29:04 PM
Last updated: 12/20/2025, 5:14:01 PM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-7782: CWE-862 Missing Authorization in WP JobHunt
HighCVE-2025-7733: CWE-639 Authorization Bypass Through User-Controlled Key in WP JobHunt
MediumCVE-2025-14298: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in damian-gora FiboSearch – Ajax Search for WooCommerce
MediumCVE-2025-12492: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in ultimatemember Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin
MediumCVE-2025-13619: CWE-269 Improper Privilege Management in CMSSuperHeroes Flex Store Users
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.