CVE-2024-40787: A shortcut may be able to bypass Internet permission requirements in Apple iOS and iPadOS
This issue was addressed by adding an additional prompt for user consent. This issue is fixed in iOS 17.6 and iPadOS 17.6, macOS Monterey 12.7.6, macOS Sonoma 14.6, macOS Ventura 13.6.8, watchOS 10.6. A shortcut may be able to bypass Internet permission requirements.
AI Analysis
Technical Summary
CVE-2024-40787 is a vulnerability in Apple’s iOS, iPadOS, and several macOS and watchOS versions that allows a shortcut to bypass the Internet permission requirements normally enforced by the operating system. Shortcuts are automation scripts that users can create or download to perform tasks on their devices. Normally, when a shortcut attempts to access the Internet, the system prompts the user for explicit consent to protect privacy and security. However, due to this vulnerability, a shortcut can circumvent these prompts, enabling it to send or receive data over the Internet without the user’s knowledge or approval. The vulnerability requires the attacker to have low-level privileges on the device (local access with limited rights) but does not require any user interaction to exploit once the shortcut is in place. The flaw impacts confidentiality and integrity by potentially allowing unauthorized data transmission or manipulation, but it does not affect system availability. Apple fixed this issue by introducing an additional user consent prompt in iOS 17.6, iPadOS 17.6, macOS Monterey 12.7.6, macOS Sonoma 14.6, macOS Ventura 13.6.8, and watchOS 10.6. There are no known exploits in the wild at the time of publication, but the CVSS score of 7.1 reflects the high risk posed by this vulnerability due to its ability to bypass security controls and the sensitive nature of Internet access permissions on personal devices.
Potential Impact
The primary impact of CVE-2024-40787 is the unauthorized bypass of Internet permission controls on Apple devices, which can lead to significant confidentiality and integrity risks. Attackers with local access can exploit this vulnerability to exfiltrate sensitive data, communicate with command and control servers, or manipulate data transmitted over the Internet without user consent. This undermines user privacy and can facilitate further attacks such as data theft, espionage, or malware propagation. Since the vulnerability does not require user interaction and only low privileges, it lowers the barrier for exploitation once an attacker gains local access, increasing the threat to organizations that use Apple devices extensively. The lack of impact on availability means systems remain operational, but the stealthy nature of the exploit can delay detection and response. Organizations handling sensitive information or operating in regulated industries face increased compliance and reputational risks if this vulnerability is exploited.
Mitigation Recommendations
To mitigate CVE-2024-40787, organizations and users should promptly update affected Apple devices to the patched versions: iOS 17.6, iPadOS 17.6, macOS Monterey 12.7.6, macOS Sonoma 14.6, macOS Ventura 13.6.8, and watchOS 10.6. Beyond patching, organizations should enforce strict device access controls to prevent unauthorized local access, including strong authentication mechanisms and device encryption. Limit the use of shortcuts to those vetted and approved by IT security teams to reduce the risk of malicious or misconfigured shortcuts. Employ mobile device management (MDM) solutions to monitor and restrict shortcut creation and execution where possible. Educate users about the risks of installing untrusted shortcuts and the importance of reviewing permission prompts carefully. Regularly audit device configurations and network traffic for unusual activity that could indicate exploitation attempts. Finally, implement endpoint detection and response (EDR) tools capable of identifying anomalous shortcut behavior or unauthorized Internet communications.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, China, India, Brazil, Italy, Spain, Netherlands, Sweden
CVE-2024-40787: A shortcut may be able to bypass Internet permission requirements in Apple iOS and iPadOS
Description
This issue was addressed by adding an additional prompt for user consent. This issue is fixed in iOS 17.6 and iPadOS 17.6, macOS Monterey 12.7.6, macOS Sonoma 14.6, macOS Ventura 13.6.8, watchOS 10.6. A shortcut may be able to bypass Internet permission requirements.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-40787 is a vulnerability in Apple’s iOS, iPadOS, and several macOS and watchOS versions that allows a shortcut to bypass the Internet permission requirements normally enforced by the operating system. Shortcuts are automation scripts that users can create or download to perform tasks on their devices. Normally, when a shortcut attempts to access the Internet, the system prompts the user for explicit consent to protect privacy and security. However, due to this vulnerability, a shortcut can circumvent these prompts, enabling it to send or receive data over the Internet without the user’s knowledge or approval. The vulnerability requires the attacker to have low-level privileges on the device (local access with limited rights) but does not require any user interaction to exploit once the shortcut is in place. The flaw impacts confidentiality and integrity by potentially allowing unauthorized data transmission or manipulation, but it does not affect system availability. Apple fixed this issue by introducing an additional user consent prompt in iOS 17.6, iPadOS 17.6, macOS Monterey 12.7.6, macOS Sonoma 14.6, macOS Ventura 13.6.8, and watchOS 10.6. There are no known exploits in the wild at the time of publication, but the CVSS score of 7.1 reflects the high risk posed by this vulnerability due to its ability to bypass security controls and the sensitive nature of Internet access permissions on personal devices.
Potential Impact
The primary impact of CVE-2024-40787 is the unauthorized bypass of Internet permission controls on Apple devices, which can lead to significant confidentiality and integrity risks. Attackers with local access can exploit this vulnerability to exfiltrate sensitive data, communicate with command and control servers, or manipulate data transmitted over the Internet without user consent. This undermines user privacy and can facilitate further attacks such as data theft, espionage, or malware propagation. Since the vulnerability does not require user interaction and only low privileges, it lowers the barrier for exploitation once an attacker gains local access, increasing the threat to organizations that use Apple devices extensively. The lack of impact on availability means systems remain operational, but the stealthy nature of the exploit can delay detection and response. Organizations handling sensitive information or operating in regulated industries face increased compliance and reputational risks if this vulnerability is exploited.
Mitigation Recommendations
To mitigate CVE-2024-40787, organizations and users should promptly update affected Apple devices to the patched versions: iOS 17.6, iPadOS 17.6, macOS Monterey 12.7.6, macOS Sonoma 14.6, macOS Ventura 13.6.8, and watchOS 10.6. Beyond patching, organizations should enforce strict device access controls to prevent unauthorized local access, including strong authentication mechanisms and device encryption. Limit the use of shortcuts to those vetted and approved by IT security teams to reduce the risk of malicious or misconfigured shortcuts. Employ mobile device management (MDM) solutions to monitor and restrict shortcut creation and execution where possible. Educate users about the risks of installing untrusted shortcuts and the importance of reviewing permission prompts carefully. Regularly audit device configurations and network traffic for unusual activity that could indicate exploitation attempts. Finally, implement endpoint detection and response (EDR) tools capable of identifying anomalous shortcut behavior or unauthorized Internet communications.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apple
- Date Reserved
- 2024-07-10T17:11:04.689Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a3b53ff58c9332ff0749c
Added to database: 11/4/2025, 5:43:47 PM
Last enriched: 4/2/2026, 11:25:37 PM
Last updated: 5/12/2026, 9:30:25 PM
Views: 47
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.