Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-27800: Processing a maliciously crafted message may lead to a denial-of-service in Apple iOS and iPadOS

0
High
VulnerabilityCVE-2024-27800cvecve-2024-27800
Published: Mon Jun 10 2024 (06/10/2024, 20:56:44 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

CVE-2024-27800 is a high-severity vulnerability affecting Apple iOS and iPadOS, where processing a maliciously crafted message can cause a denial-of-service (DoS) condition. The flaw stems from resource exhaustion (CWE-400) triggered by the vulnerable message processing code. Apple has addressed this issue by removing the vulnerable code in iOS 16. 7. 8, iPadOS 16. 7. 8, and other related OS versions. Exploitation requires local access and user interaction but no privileges, making it moderately accessible. The vulnerability impacts confidentiality and availability, with a CVSS score of 7. 1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 20:05:48 UTC

Technical Analysis

CVE-2024-27800 is a denial-of-service vulnerability identified in Apple iOS and iPadOS platforms, including related operating systems such as macOS Monterey, Ventura, Sonoma, tvOS, visionOS, and watchOS. The vulnerability arises from the processing of specially crafted messages that exploit a resource exhaustion weakness (CWE-400), leading to a denial-of-service condition. This could cause affected devices to become unresponsive or crash, disrupting normal operations. The vulnerability does not require privileges but does require user interaction, such as opening or processing a malicious message. Apple has mitigated this issue by removing the vulnerable code in the security updates released for iOS 16.7.8, iPadOS 16.7.8, iOS 17.5, iPadOS 17.5, and corresponding versions of macOS and other Apple OSes. The CVSS v3.1 base score is 7.1, reflecting high severity due to the impact on confidentiality (high) and availability (high), with low attack complexity and no privileges required. No known exploits have been reported in the wild, but the vulnerability could be leveraged by attackers to disrupt services on Apple devices, especially in environments where message processing is frequent and automated. The vulnerability affects a broad range of Apple operating systems, indicating a wide potential attack surface across consumer and enterprise devices.

Potential Impact

The primary impact of CVE-2024-27800 is denial-of-service, which can disrupt device availability by causing crashes or unresponsiveness when processing malicious messages. This can affect individual users and organizations relying on Apple devices for critical communications and operations. The high confidentiality impact suggests that the vulnerability might also expose sensitive information during the exploitation process, though integrity impact is not indicated. Organizations with large deployments of iPhones, iPads, and Macs could experience operational disruptions, impacting productivity and potentially leading to service outages. In sectors such as healthcare, finance, and government where Apple devices are prevalent, such disruptions could have significant operational and reputational consequences. The requirement for user interaction limits remote mass exploitation but targeted phishing or social engineering attacks could trigger the vulnerability. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits post-disclosure. Failure to patch could leave organizations vulnerable to denial-of-service attacks that degrade user experience and availability of critical services.

Mitigation Recommendations

Organizations should prioritize deploying the security updates released by Apple for iOS 16.7.8, iPadOS 16.7.8, iOS 17.5, iPadOS 17.5, and the corresponding macOS, tvOS, visionOS, and watchOS versions. Beyond patching, organizations should implement email and messaging filtering to detect and block suspicious or malformed messages that could exploit this vulnerability. User awareness training is critical to reduce the risk of interaction with malicious messages, emphasizing caution when opening unexpected or suspicious communications. Network-level protections such as intrusion detection systems (IDS) and anomaly detection can help identify unusual message traffic patterns indicative of exploitation attempts. For managed Apple device environments, leveraging Mobile Device Management (MDM) solutions to enforce timely updates and restrict risky message sources can reduce exposure. Monitoring device logs for crashes or abnormal behavior related to message processing can provide early warning of exploitation attempts. Finally, organizations should maintain robust backup and recovery procedures to mitigate operational impacts from potential denial-of-service conditions.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2024-02-26T15:32:28.516Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69ceb81de6bfc5ba1df6e204

Added to database: 4/2/2026, 6:40:29 PM

Last enriched: 4/2/2026, 8:05:48 PM

Last updated: 4/3/2026, 5:51:46 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses