Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-23295: An unauthenticated user may be able to use an unprotected Persona in Apple visionOS

0
Medium
VulnerabilityCVE-2024-23295cvecve-2024-23295
Published: Fri Mar 08 2024 (03/08/2024, 01:35:20 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: visionOS

Description

A permissions issue was addressed to help ensure Personas are always protected This issue is fixed in visionOS 1.1. An unauthenticated user may be able to use an unprotected Persona.

AI-Powered Analysis

AILast updated: 11/04/2025, 19:14:09 UTC

Technical Analysis

CVE-2024-23295 is a permissions vulnerability identified in Apple visionOS, the operating system for Apple's augmented and virtual reality devices. The issue stems from an unprotected Persona that can be accessed by an unauthenticated user, meaning an attacker without any credentials or prior authentication can potentially use or assume a Persona that should be protected. Personas in visionOS represent user profiles or identities that control access to personalized data and settings. The vulnerability arises because the system failed to enforce proper permissions on these Personas, allowing unauthorized local users to access them. The vulnerability does not require user interaction and can be exploited with low attack complexity, but it requires local access (AV:L) to the device, limiting remote exploitation. The impact is primarily on confidentiality, as unauthorized users may view or use personal data associated with the Persona. There is no impact on integrity or availability. Apple fixed this issue in visionOS 1.1 by ensuring that Personas are always protected with appropriate permissions. No known exploits have been reported in the wild, and the affected versions are unspecified but presumably versions prior to 1.1. The CVSS v3.1 score is 6.2, reflecting medium severity due to the confidentiality impact and local access requirement.

Potential Impact

For European organizations, the primary impact of CVE-2024-23295 is the potential unauthorized access to sensitive personal data stored or accessible via visionOS Personas. This could lead to privacy violations and data leakage, especially in sectors where AR/VR devices are used for sensitive applications such as healthcare, design, or confidential communications. Since the vulnerability requires local access, the risk is higher in environments where devices are shared, publicly accessible, or insufficiently physically secured. The lack of integrity or availability impact reduces the risk of operational disruption but does not eliminate concerns about data confidentiality and compliance with data protection regulations like GDPR. Organizations deploying visionOS devices in Europe should be aware of this vulnerability to prevent insider threats or unauthorized physical access leading to data exposure.

Mitigation Recommendations

1. Immediately update all Apple visionOS devices to version 1.1 or later, where the vulnerability is fixed. 2. Enforce strict physical security controls to prevent unauthorized local access to visionOS devices, especially in shared or public environments. 3. Implement device usage policies that limit access to trusted users and monitor device usage logs for suspicious activity. 4. Educate users about the importance of securing their AR/VR devices and not leaving them unattended in unsecured locations. 5. Where feasible, disable or restrict Persona sharing or switching features until devices are patched. 6. Coordinate with Apple support for any additional security guidance or patches related to visionOS. 7. Integrate visionOS device management into existing endpoint security and asset management frameworks to ensure timely updates and compliance.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2024-01-12T22:22:21.502Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a47596d939959c8022cd3

Added to database: 11/4/2025, 6:35:05 PM

Last enriched: 11/4/2025, 7:14:09 PM

Last updated: 11/5/2025, 2:02:17 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats