Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-27814: A person with physical access to a device may be able to view contact information from the lock screen in Apple watchOS

0
Low
VulnerabilityCVE-2024-27814cvecve-2024-27814
Published: Mon Jun 10 2024 (06/10/2024, 20:56:41 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: watchOS

Description

This issue was addressed through improved state management. This issue is fixed in watchOS 10.5. A person with physical access to a device may be able to view contact information from the lock screen.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 20:09:17 UTC

Technical Analysis

CVE-2024-27814 is a vulnerability identified in Apple watchOS that permits an attacker with physical access to the device to view contact information directly from the lock screen. The root cause is improper state management within the watchOS interface, which fails to adequately restrict access to sensitive contact data when the device is locked. This vulnerability does not require any authentication or user interaction, making it possible for an attacker who gains physical possession of the device to extract contact details without unlocking it. The issue was addressed by Apple in watchOS 10.5 through improved state management controls that prevent contact information from being displayed on the lock screen. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The CVSS v3.1 base score is 2.4, reflecting a low severity due to the requirement of physical access and the limited scope of impact (confidentiality only). There are no known exploits in the wild, and the vulnerability does not affect device integrity or availability. This flaw primarily exposes user contact information, which could be leveraged for social engineering or targeted phishing attacks if an attacker has physical access to the device.

Potential Impact

The primary impact of CVE-2024-27814 is the unauthorized disclosure of contact information from the lock screen of affected Apple Watch devices. This breach of confidentiality could facilitate social engineering, spear-phishing, or identity theft if attackers obtain sensitive contact details. However, the vulnerability does not allow modification of data or disruption of device functionality, limiting its impact to information exposure only. Organizations that issue Apple Watches to employees, especially those in sensitive roles or handling confidential information, could face increased risk of targeted attacks if devices are lost or stolen. The requirement for physical access reduces the likelihood of remote exploitation but raises concerns in environments where devices are frequently unattended or shared. Overall, while the direct technical impact is low, the potential for indirect consequences through misuse of exposed contact data warrants prompt remediation.

Mitigation Recommendations

To mitigate CVE-2024-27814, organizations and users should promptly update all affected Apple Watch devices to watchOS version 10.5 or later, where the vulnerability has been fixed. Additionally, enforcing strong physical security controls to prevent unauthorized access to devices is critical, including policies for device handling, storage, and supervision. Implementing device management solutions that allow remote wiping or locking of lost or stolen watches can reduce exposure. Users should also review and minimize the amount of sensitive contact information stored on their devices. Training employees on the risks of physical device compromise and encouraging the use of passcodes and biometric locks on paired iPhones can further reduce risk. Finally, monitoring for lost or stolen devices and responding quickly to such incidents will limit the window of opportunity for exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2024-02-26T15:32:28.520Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69ceb821e6bfc5ba1df6e637

Added to database: 4/2/2026, 6:40:33 PM

Last enriched: 4/2/2026, 8:09:17 PM

Last updated: 4/3/2026, 5:55:44 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses