Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-23278: An app may be able to break out of its sandbox in Apple iOS and iPadOS

0
High
VulnerabilityCVE-2024-23278cvecve-2024-23278
Published: Fri Mar 08 2024 (03/08/2024, 01:36:11 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

CVE-2024-23278 is a high-severity vulnerability in Apple iOS and iPadOS that allows an app to break out of its sandbox and potentially execute arbitrary code with elevated privileges. The issue is related to the libxpc component and was addressed by Apple through improved memory handling. This vulnerability affects iOS versions prior to 16. 7. 6 and 17. 4, as well as corresponding iPadOS versions. Apple has released official patches in iOS 16. 7. 6, iPadOS 16. 7.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/09/2026, 23:07:34 UTC

Technical Analysis

CVE-2024-23278 is a vulnerability in the libxpc component of Apple iOS and iPadOS that could allow a malicious app to break out of its sandbox and execute arbitrary code with certain elevated privileges. The vulnerability was addressed by Apple with improved memory handling to prevent such unauthorized privilege escalation. This issue is fixed in iOS 16.7.6, iPadOS 16.7.6, iOS 17.4, and iPadOS 17.4. The CVSS v3.1 base score is 7.7, indicating a high severity with attack vector local, low attack complexity, no privileges required, no user interaction, unchanged scope, and high impact on confidentiality and integrity but no impact on availability.

Potential Impact

An attacker who can run a malicious app on a vulnerable iOS or iPadOS device may be able to escape the app sandbox and execute arbitrary code with elevated privileges. This could lead to unauthorized access to sensitive data and compromise system integrity. The vulnerability does not impact availability and requires local access with no user interaction. There are no reports of exploitation in the wild at this time.

Mitigation Recommendations

Apple has released official patches that fully address this vulnerability. Users and administrators should update affected devices to iOS 16.7.6, iPadOS 16.7.6, iOS 17.4, or iPadOS 17.4 as soon as possible to mitigate the risk. No additional mitigation steps are required beyond applying these updates.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2024-01-12T22:22:21.499Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a47556d939959c8022a87

Added to database: 11/4/2025, 6:35:01 PM

Last enriched: 4/9/2026, 11:07:34 PM

Last updated: 5/9/2026, 8:36:35 AM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses