Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-40787: A shortcut may be able to bypass Internet permission requirements in Apple iOS and iPadOS

0
High
VulnerabilityCVE-2024-40787cvecve-2024-40787
Published: Mon Jul 29 2024 (07/29/2024, 22:16:42 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

This issue was addressed by adding an additional prompt for user consent. This issue is fixed in macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, macOS Sonoma 14.6. A shortcut may be able to bypass Internet permission requirements.

AI-Powered Analysis

AILast updated: 11/04/2025, 18:05:29 UTC

Technical Analysis

CVE-2024-40787 is a vulnerability discovered in Apple’s iOS and iPadOS platforms, as well as related operating systems like macOS and watchOS, where a crafted shortcut can bypass the normal internet permission requirements. Normally, shortcuts that attempt to access the internet prompt the user for consent to prevent unauthorized network communications. However, this vulnerability allows a shortcut to circumvent this prompt, enabling it to access the internet without explicit user approval. The flaw affects multiple Apple OS versions prior to the patched releases: iOS 17.6, iPadOS 17.6, macOS Ventura 13.6.8, Monterey 12.7.6, Sonoma 14.6, and watchOS 10.6. The vulnerability requires local access with limited privileges (AV:L - Attack Vector: Local) and low attack complexity (AC:L), with privileges required (PR:L) but no user interaction needed (UI:N). The scope is unchanged (S:U), but the impact on confidentiality and integrity is high (C:H/I:H), while availability is not affected (A:N). This means an attacker with local access can use a malicious shortcut to exfiltrate data or manipulate information by bypassing the usual internet permission controls, potentially leading to data leakage or unauthorized communications. Apple fixed the issue by introducing an additional user consent prompt to ensure that shortcuts cannot silently access the internet. There are no known exploits in the wild at the time of publication, but the vulnerability’s characteristics make it a significant risk if exploited. The vulnerability primarily affects devices running unpatched versions of the affected Apple operating systems. Given the widespread use of Apple devices in enterprise and government environments, especially in Europe, this vulnerability poses a notable threat to confidentiality and integrity of sensitive data handled on these devices.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized data exfiltration or manipulation via malicious shortcuts on Apple devices. Sectors such as finance, healthcare, government, and critical infrastructure that rely on Apple hardware for secure communications and data processing are particularly at risk. The ability to bypass internet permission prompts undermines user consent mechanisms and could facilitate stealthy data leaks or command and control communications. Since the attack requires local access, insider threats or compromised devices are the most likely vectors. The impact on confidentiality and integrity could result in loss of sensitive corporate or personal data, regulatory non-compliance (e.g., GDPR violations), and reputational damage. The absence of availability impact means systems remain operational but compromised. Organizations with Bring Your Own Device (BYOD) policies or extensive mobile workforces using Apple devices should be especially vigilant. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers may develop exploits rapidly. Failure to patch promptly could expose European organizations to targeted attacks leveraging this vulnerability.

Mitigation Recommendations

1. Immediately deploy the security updates released by Apple: iOS 17.6, iPadOS 17.6, macOS Ventura 13.6.8, Monterey 12.7.6, Sonoma 14.6, and watchOS 10.6. 2. Restrict the use of shortcuts on corporate devices through Mobile Device Management (MDM) solutions, limiting the ability to install or run untrusted shortcuts. 3. Implement strict application and shortcut whitelisting policies to prevent unauthorized shortcuts from executing. 4. Monitor network traffic from Apple devices for unusual or unauthorized outbound connections that could indicate exploitation attempts. 5. Educate users about the risks of installing shortcuts from untrusted sources and the importance of applying updates promptly. 6. For sensitive environments, consider disabling shortcuts entirely or enforcing additional user consent mechanisms via configuration profiles. 7. Conduct regular audits of device configurations and installed shortcuts to detect any suspicious activity. 8. Integrate endpoint detection and response (EDR) tools capable of monitoring shortcut execution and network behavior on Apple devices. These measures go beyond generic patching by focusing on controlling shortcut usage and monitoring for exploitation signs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2024-07-10T17:11:04.689Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a3b53ff58c9332ff0749c

Added to database: 11/4/2025, 5:43:47 PM

Last enriched: 11/4/2025, 6:05:29 PM

Last updated: 12/20/2025, 5:14:38 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats