Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-27850: A maliciously crafted webpage may be able to fingerprint the user in Apple iOS and iPadOS

0
Medium
VulnerabilityCVE-2024-27850cvecve-2024-27850
Published: Mon Jun 10 2024 (06/10/2024, 20:56:45 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

This issue was addressed with improvements to the noise injection algorithm. This issue is fixed in visionOS 1.2, macOS Sonoma 14.5, Safari 17.5, iOS 17.5 and iPadOS 17.5. A maliciously crafted webpage may be able to fingerprint the user.

AI-Powered Analysis

AILast updated: 11/04/2025, 17:59:40 UTC

Technical Analysis

CVE-2024-27850 is a vulnerability identified in Apple’s iOS and iPadOS platforms that allows a maliciously crafted webpage to fingerprint users. Fingerprinting is a technique used to uniquely identify and track users based on device and browser characteristics, circumventing traditional privacy protections like cookie restrictions. The root cause of this vulnerability lies in the noise injection algorithm used by Apple to obfuscate or randomize certain browser or device signals to prevent fingerprinting. The noise injection was insufficiently robust, allowing attackers to analyze subtle patterns and reliably fingerprint users visiting a malicious webpage. This vulnerability requires no privileges (AV:N), has low attack complexity (AC:L), and does not require authentication (PR:N), but it does require user interaction (UI:R) in the form of visiting a malicious webpage. The impact is primarily on user privacy (I:H), with no direct confidentiality or availability impact. Apple addressed the issue by enhancing the noise injection algorithm, releasing fixes in iOS 17.5, iPadOS 17.5, macOS Sonoma 14.5, Safari 17.5, and visionOS 1.2. The vulnerability is tracked under CWE-359 (Exposure of Private Information Through Environmental Variables). No known exploits have been reported in the wild as of the publication date.

Potential Impact

For European organizations, the primary impact of CVE-2024-27850 is the erosion of user privacy through enhanced fingerprinting capabilities by malicious actors. This can lead to unauthorized tracking and profiling of users, potentially violating GDPR and other privacy regulations. Organizations relying on Apple devices for mobile workforce or customer engagement may face increased risks of user data being collected without consent, impacting trust and compliance. While the vulnerability does not allow direct system compromise or data exfiltration, the privacy implications can be significant, especially for sectors handling sensitive personal data such as finance, healthcare, and government. Additionally, fingerprinting can be used as a precursor to more targeted attacks or fraud. The lack of known exploits reduces immediate risk, but the widespread use of Apple devices in Europe means the potential attack surface is large. Failure to patch promptly could expose users to tracking by malicious websites or advertisers.

Mitigation Recommendations

European organizations should prioritize updating all Apple devices to iOS 17.5, iPadOS 17.5, macOS Sonoma 14.5, Safari 17.5, or visionOS 1.2 as applicable. Beyond patching, organizations should implement network-level protections such as web filtering to block access to known malicious or suspicious websites that could host fingerprinting scripts. Employing privacy-focused browser extensions or configurations that limit script execution and fingerprinting vectors can further reduce risk. User awareness training should emphasize the dangers of visiting untrusted websites and the importance of applying software updates promptly. Organizations managing mobile device fleets should enforce update policies via Mobile Device Management (MDM) solutions to ensure compliance. Monitoring network traffic for unusual patterns indicative of fingerprinting attempts can provide early detection. Finally, reviewing privacy policies and ensuring compliance with GDPR regarding user tracking and data collection is critical.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2024-02-26T15:32:28.532Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a3b65ff58c9332ff09f00

Added to database: 11/4/2025, 5:44:05 PM

Last enriched: 11/4/2025, 5:59:40 PM

Last updated: 12/19/2025, 7:02:11 AM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats