Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-27847: An app may be able to bypass Privacy preferences in Apple iOS and iPadOS

0
High
VulnerabilityCVE-2024-27847cvecve-2024-27847
Published: Mon May 13 2024 (05/13/2024, 23:00:55 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

This issue was addressed with improved checks This issue is fixed in iOS 17.5 and iPadOS 17.5, macOS Sonoma 14.5. An app may be able to bypass Privacy preferences.

AI-Powered Analysis

AILast updated: 12/23/2025, 17:18:30 UTC

Technical Analysis

CVE-2024-27847 is a vulnerability identified in Apple’s iOS and iPadOS platforms that allows an application to bypass the operating system’s privacy preference controls. This issue stems from insufficient enforcement of privacy checks, enabling malicious or unauthorized apps to access protected data or system capabilities that should be restricted by user-configured privacy settings. The vulnerability affects versions prior to iOS 17.5, iPadOS 17.5, and macOS Sonoma 14.5, where Apple has implemented improved validation mechanisms to address the flaw. The CVSS v3.1 score of 7.4 reflects a high-severity rating, with the vector indicating that exploitation requires local access (AV:L), high attack complexity (AC:H), no privileges (PR:N), and no user interaction (UI:N). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), meaning a successful exploit could fully compromise the device’s security posture. Although no public exploits have been observed in the wild, the vulnerability’s nature suggests that attackers with local access could leverage it to circumvent privacy controls, potentially accessing sensitive user data or manipulating system functions without authorization. This vulnerability is classified under CWE-277, which relates to improper authorization, highlighting the failure to correctly enforce access controls. Given the widespread use of Apple devices in enterprise and personal contexts, this vulnerability represents a significant risk vector if left unpatched.

Potential Impact

For European organizations, the impact of CVE-2024-27847 could be substantial, especially for those relying heavily on Apple mobile devices for business operations, communications, and data storage. The ability for an app to bypass privacy preferences undermines user trust and regulatory compliance, particularly with GDPR requirements around data protection and user consent. Confidential information such as emails, contacts, location data, and corporate apps could be exposed or manipulated. This could lead to data breaches, intellectual property theft, or unauthorized surveillance. Additionally, the integrity and availability of devices could be compromised, affecting operational continuity. Sectors such as finance, healthcare, government, and critical infrastructure, which often use iOS devices for secure communications and data access, are particularly vulnerable. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers may develop exploits targeting this vulnerability. Failure to patch promptly could result in targeted attacks exploiting this flaw to gain unauthorized access or escalate privileges within corporate environments.

Mitigation Recommendations

To mitigate CVE-2024-27847, European organizations should prioritize updating all affected Apple devices to iOS 17.5, iPadOS 17.5, or macOS Sonoma 14.5 as soon as possible. Beyond patching, organizations should enforce strict mobile device management (MDM) policies that limit app installation to vetted and trusted sources, reducing the risk of malicious apps exploiting this vulnerability. Regular audits of installed applications and their permissions can help detect anomalous behavior indicative of exploitation attempts. Employing endpoint detection and response (EDR) tools tailored for iOS can enhance visibility into suspicious activities. User education on the risks of installing untrusted apps and the importance of timely updates is critical. For highly sensitive environments, consider restricting local access to devices and implementing additional authentication controls. Monitoring network traffic for unusual data flows from mobile devices may also help identify exploitation attempts. Finally, coordinate with Apple support and security advisories to stay informed about any emerging threats or additional patches related to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2024-02-26T15:32:28.531Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69418d7b9050fe8508ffc231

Added to database: 12/16/2025, 4:48:59 PM

Last enriched: 12/23/2025, 5:18:30 PM

Last updated: 2/7/2026, 8:01:02 AM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats