CVE-2024-23245: Third-party shortcuts may use a legacy action from Automator to send events to apps without user consent in Apple macOS
This issue was addressed by adding an additional prompt for user consent. This issue is fixed in macOS Sonoma 14.4, macOS Monterey 12.7.4, macOS Ventura 13.6.5. Third-party shortcuts may use a legacy action from Automator to send events to apps without user consent.
AI Analysis
Technical Summary
CVE-2024-23245 is a vulnerability identified in Apple macOS affecting the way third-party shortcuts interact with applications via Automator, a legacy macOS automation tool. Specifically, certain shortcuts could leverage a legacy Automator action to send events to other applications without obtaining explicit user consent, potentially enabling unauthorized actions within those apps. This behavior undermines the security model by bypassing user approval mechanisms designed to prevent automated or scripted interactions that could lead to data leakage or manipulation. The vulnerability affects multiple macOS versions prior to the patched releases: Sonoma 14.4, Monterey 12.7.4, and Ventura 13.6.5. The CVSS v3.1 base score is 5.4 (medium severity), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R) to approve the shortcut initially. The impact includes limited confidentiality and integrity loss, as malicious shortcuts could send unauthorized events to apps, potentially accessing or modifying data without explicit user approval. Availability is not impacted. Apple mitigated this vulnerability by adding an additional prompt requiring explicit user consent before such legacy Automator actions can send events to apps, thereby restoring user control. There are no known exploits in the wild at this time, but the vulnerability could be leveraged in targeted attacks or social engineering campaigns that trick users into installing malicious shortcuts. This vulnerability highlights risks associated with legacy automation features and the importance of user consent in inter-application communication on macOS.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to confidentiality and integrity of data on macOS systems. Attackers could craft malicious shortcuts that, once approved by a user, send unauthorized events to applications, potentially leading to data exposure or unauthorized modifications. This could be exploited in targeted phishing or social engineering attacks aimed at employees to gain footholds or exfiltrate sensitive information. While availability is not affected, the stealthy nature of such interactions could complicate detection and response. Organizations with significant macOS deployments, especially in sectors handling sensitive data such as finance, healthcare, and government, could face increased risk. The requirement for user interaction limits mass exploitation but does not eliminate risk, particularly in environments where users may be less security-aware. Additionally, the legacy nature of Automator actions means older shortcuts or automation workflows in use could be vectors for exploitation. Failure to patch could also expose organizations to compliance risks under GDPR if personal data confidentiality is compromised.
Mitigation Recommendations
European organizations should take the following specific steps beyond generic patching advice: 1) Immediately update all macOS devices to versions Sonoma 14.4, Monterey 12.7.4, or Ventura 13.6.5 or later to ensure the vulnerability is patched. 2) Audit and restrict the use of third-party shortcuts and Automator workflows, especially those obtained from untrusted sources. 3) Implement endpoint security monitoring to detect unusual inter-application event activity that could indicate exploitation attempts. 4) Educate users on the risks of installing shortcuts and the importance of scrutinizing consent prompts carefully. 5) Use Mobile Device Management (MDM) solutions to enforce policies limiting shortcut installation or execution where feasible. 6) Review legacy automation scripts and workflows for potential abuse and update or disable those that use legacy Automator actions. 7) Incorporate this vulnerability into incident response playbooks to quickly identify and remediate any exploitation attempts. These targeted measures will reduce the attack surface and improve detection capabilities specific to this vulnerability.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Denmark, Finland, Ireland, Switzerland, Norway
CVE-2024-23245: Third-party shortcuts may use a legacy action from Automator to send events to apps without user consent in Apple macOS
Description
This issue was addressed by adding an additional prompt for user consent. This issue is fixed in macOS Sonoma 14.4, macOS Monterey 12.7.4, macOS Ventura 13.6.5. Third-party shortcuts may use a legacy action from Automator to send events to apps without user consent.
AI-Powered Analysis
Technical Analysis
CVE-2024-23245 is a vulnerability identified in Apple macOS affecting the way third-party shortcuts interact with applications via Automator, a legacy macOS automation tool. Specifically, certain shortcuts could leverage a legacy Automator action to send events to other applications without obtaining explicit user consent, potentially enabling unauthorized actions within those apps. This behavior undermines the security model by bypassing user approval mechanisms designed to prevent automated or scripted interactions that could lead to data leakage or manipulation. The vulnerability affects multiple macOS versions prior to the patched releases: Sonoma 14.4, Monterey 12.7.4, and Ventura 13.6.5. The CVSS v3.1 base score is 5.4 (medium severity), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R) to approve the shortcut initially. The impact includes limited confidentiality and integrity loss, as malicious shortcuts could send unauthorized events to apps, potentially accessing or modifying data without explicit user approval. Availability is not impacted. Apple mitigated this vulnerability by adding an additional prompt requiring explicit user consent before such legacy Automator actions can send events to apps, thereby restoring user control. There are no known exploits in the wild at this time, but the vulnerability could be leveraged in targeted attacks or social engineering campaigns that trick users into installing malicious shortcuts. This vulnerability highlights risks associated with legacy automation features and the importance of user consent in inter-application communication on macOS.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to confidentiality and integrity of data on macOS systems. Attackers could craft malicious shortcuts that, once approved by a user, send unauthorized events to applications, potentially leading to data exposure or unauthorized modifications. This could be exploited in targeted phishing or social engineering attacks aimed at employees to gain footholds or exfiltrate sensitive information. While availability is not affected, the stealthy nature of such interactions could complicate detection and response. Organizations with significant macOS deployments, especially in sectors handling sensitive data such as finance, healthcare, and government, could face increased risk. The requirement for user interaction limits mass exploitation but does not eliminate risk, particularly in environments where users may be less security-aware. Additionally, the legacy nature of Automator actions means older shortcuts or automation workflows in use could be vectors for exploitation. Failure to patch could also expose organizations to compliance risks under GDPR if personal data confidentiality is compromised.
Mitigation Recommendations
European organizations should take the following specific steps beyond generic patching advice: 1) Immediately update all macOS devices to versions Sonoma 14.4, Monterey 12.7.4, or Ventura 13.6.5 or later to ensure the vulnerability is patched. 2) Audit and restrict the use of third-party shortcuts and Automator workflows, especially those obtained from untrusted sources. 3) Implement endpoint security monitoring to detect unusual inter-application event activity that could indicate exploitation attempts. 4) Educate users on the risks of installing shortcuts and the importance of scrutinizing consent prompts carefully. 5) Use Mobile Device Management (MDM) solutions to enforce policies limiting shortcut installation or execution where feasible. 6) Review legacy automation scripts and workflows for potential abuse and update or disable those that use legacy Automator actions. 7) Incorporate this vulnerability into incident response playbooks to quickly identify and remediate any exploitation attempts. These targeted measures will reduce the attack surface and improve detection capabilities specific to this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apple
- Date Reserved
- 2024-01-12T22:22:21.483Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a47526d939959c80226c5
Added to database: 11/4/2025, 6:34:58 PM
Last enriched: 11/4/2025, 9:27:39 PM
Last updated: 11/5/2025, 3:40:35 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64459: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in djangoproject Django
UnknownCVE-2025-64458: CWE-407: Inefficient Algorithmic Complexity in djangoproject Django
UnknownCVE-2025-52602: CWE-359: Exposure of Private Personal Information to an Unauthorized Actor in HCL Software BigFix Query
MediumCVE-2025-3125: CWE-434 Unrestricted Upload of File with Dangerous Type in WSO2 WSO2 Identity Server
MediumCVE-2025-47151: CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') in Entr'ouvert Lasso
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.