Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-27800: Processing a maliciously crafted message may lead to a denial-of-service in Apple iOS and iPadOS

0
High
VulnerabilityCVE-2024-27800cvecve-2024-27800
Published: Mon Jun 10 2024 (06/10/2024, 20:56:44 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

CVE-2024-27800 is a vulnerability in Apple iOS and iPadOS where processing a maliciously crafted message may lead to a denial-of-service (DoS) condition. The issue was addressed by Apple through removal of the vulnerable code and improved memory handling. This vulnerability affects multiple versions of iOS and iPadOS prior to the patched releases. Apple released fixes for this vulnerability in iOS 16. 7. 8, iPadOS 16. 7. 8, iOS 17. 5, and iPadOS 17. 5.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/09/2026, 23:11:46 UTC

Technical Analysis

CVE-2024-27800 is a high-severity vulnerability in Apple iOS and iPadOS where processing a maliciously crafted message can cause a denial-of-service condition. The root cause involved vulnerable code that was removed in the patched versions. The vulnerability affects multiple Apple operating system versions and was fixed by Apple in iOS 16.7.8, iPadOS 16.7.8, iOS 17.5, and iPadOS 17.5. The fix involved removing the vulnerable code and improving memory handling to prevent unexpected system shutdowns. The vulnerability is related to CWE-400 (Uncontrolled Resource Consumption). There are no reports of active exploitation in the wild. The vendor advisory confirms the availability of official patches.

Potential Impact

Successful exploitation of this vulnerability may cause a denial-of-service condition resulting in unexpected system shutdown or app termination on affected Apple devices running vulnerable versions of iOS and iPadOS. The impact is limited to availability disruption; there is no indication of confidentiality or integrity compromise from this vulnerability. No known exploits are currently active in the wild.

Mitigation Recommendations

Apple has released official patches addressing this vulnerability in iOS 16.7.8, iPadOS 16.7.8, iOS 17.5, and iPadOS 17.5. Users and administrators should apply these updates promptly to remediate the issue. Since the vendor has provided official fixes, no additional mitigation steps are required beyond updating to the fixed versions.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2024-02-26T15:32:28.516Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69ceb81de6bfc5ba1df6e204

Added to database: 4/2/2026, 6:40:29 PM

Last enriched: 4/9/2026, 11:11:46 PM

Last updated: 5/20/2026, 9:51:01 PM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses