CVE-2024-40787: A shortcut may be able to bypass Internet permission requirements in Apple iOS and iPadOS
This issue was addressed by adding an additional prompt for user consent. This issue is fixed in macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, macOS Sonoma 14.6. A shortcut may be able to bypass Internet permission requirements.
AI Analysis
Technical Summary
CVE-2024-40787 is a vulnerability discovered in Apple’s iOS and iPadOS platforms, as well as related operating systems like macOS and watchOS, where a crafted shortcut can bypass the normal internet permission requirements. Normally, shortcuts that attempt to access the internet prompt the user for consent to prevent unauthorized network communications. However, this vulnerability allows a shortcut to circumvent this prompt, enabling it to access the internet without explicit user approval. The flaw affects multiple Apple OS versions prior to the patched releases: iOS 17.6, iPadOS 17.6, macOS Ventura 13.6.8, Monterey 12.7.6, Sonoma 14.6, and watchOS 10.6. The vulnerability requires local access with limited privileges (AV:L - Attack Vector: Local) and low attack complexity (AC:L), with privileges required (PR:L) but no user interaction needed (UI:N). The scope is unchanged (S:U), but the impact on confidentiality and integrity is high (C:H/I:H), while availability is not affected (A:N). This means an attacker with local access can use a malicious shortcut to exfiltrate data or manipulate information by bypassing the usual internet permission controls, potentially leading to data leakage or unauthorized communications. Apple fixed the issue by introducing an additional user consent prompt to ensure that shortcuts cannot silently access the internet. There are no known exploits in the wild at the time of publication, but the vulnerability’s characteristics make it a significant risk if exploited. The vulnerability primarily affects devices running unpatched versions of the affected Apple operating systems. Given the widespread use of Apple devices in enterprise and government environments, especially in Europe, this vulnerability poses a notable threat to confidentiality and integrity of sensitive data handled on these devices.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized data exfiltration or manipulation via malicious shortcuts on Apple devices. Sectors such as finance, healthcare, government, and critical infrastructure that rely on Apple hardware for secure communications and data processing are particularly at risk. The ability to bypass internet permission prompts undermines user consent mechanisms and could facilitate stealthy data leaks or command and control communications. Since the attack requires local access, insider threats or compromised devices are the most likely vectors. The impact on confidentiality and integrity could result in loss of sensitive corporate or personal data, regulatory non-compliance (e.g., GDPR violations), and reputational damage. The absence of availability impact means systems remain operational but compromised. Organizations with Bring Your Own Device (BYOD) policies or extensive mobile workforces using Apple devices should be especially vigilant. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers may develop exploits rapidly. Failure to patch promptly could expose European organizations to targeted attacks leveraging this vulnerability.
Mitigation Recommendations
1. Immediately deploy the security updates released by Apple: iOS 17.6, iPadOS 17.6, macOS Ventura 13.6.8, Monterey 12.7.6, Sonoma 14.6, and watchOS 10.6. 2. Restrict the use of shortcuts on corporate devices through Mobile Device Management (MDM) solutions, limiting the ability to install or run untrusted shortcuts. 3. Implement strict application and shortcut whitelisting policies to prevent unauthorized shortcuts from executing. 4. Monitor network traffic from Apple devices for unusual or unauthorized outbound connections that could indicate exploitation attempts. 5. Educate users about the risks of installing shortcuts from untrusted sources and the importance of applying updates promptly. 6. For sensitive environments, consider disabling shortcuts entirely or enforcing additional user consent mechanisms via configuration profiles. 7. Conduct regular audits of device configurations and installed shortcuts to detect any suspicious activity. 8. Integrate endpoint detection and response (EDR) tools capable of monitoring shortcut execution and network behavior on Apple devices. These measures go beyond generic patching by focusing on controlling shortcut usage and monitoring for exploitation signs.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Norway, Denmark, Finland, Ireland, Switzerland
CVE-2024-40787: A shortcut may be able to bypass Internet permission requirements in Apple iOS and iPadOS
Description
This issue was addressed by adding an additional prompt for user consent. This issue is fixed in macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, macOS Sonoma 14.6. A shortcut may be able to bypass Internet permission requirements.
AI-Powered Analysis
Technical Analysis
CVE-2024-40787 is a vulnerability discovered in Apple’s iOS and iPadOS platforms, as well as related operating systems like macOS and watchOS, where a crafted shortcut can bypass the normal internet permission requirements. Normally, shortcuts that attempt to access the internet prompt the user for consent to prevent unauthorized network communications. However, this vulnerability allows a shortcut to circumvent this prompt, enabling it to access the internet without explicit user approval. The flaw affects multiple Apple OS versions prior to the patched releases: iOS 17.6, iPadOS 17.6, macOS Ventura 13.6.8, Monterey 12.7.6, Sonoma 14.6, and watchOS 10.6. The vulnerability requires local access with limited privileges (AV:L - Attack Vector: Local) and low attack complexity (AC:L), with privileges required (PR:L) but no user interaction needed (UI:N). The scope is unchanged (S:U), but the impact on confidentiality and integrity is high (C:H/I:H), while availability is not affected (A:N). This means an attacker with local access can use a malicious shortcut to exfiltrate data or manipulate information by bypassing the usual internet permission controls, potentially leading to data leakage or unauthorized communications. Apple fixed the issue by introducing an additional user consent prompt to ensure that shortcuts cannot silently access the internet. There are no known exploits in the wild at the time of publication, but the vulnerability’s characteristics make it a significant risk if exploited. The vulnerability primarily affects devices running unpatched versions of the affected Apple operating systems. Given the widespread use of Apple devices in enterprise and government environments, especially in Europe, this vulnerability poses a notable threat to confidentiality and integrity of sensitive data handled on these devices.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized data exfiltration or manipulation via malicious shortcuts on Apple devices. Sectors such as finance, healthcare, government, and critical infrastructure that rely on Apple hardware for secure communications and data processing are particularly at risk. The ability to bypass internet permission prompts undermines user consent mechanisms and could facilitate stealthy data leaks or command and control communications. Since the attack requires local access, insider threats or compromised devices are the most likely vectors. The impact on confidentiality and integrity could result in loss of sensitive corporate or personal data, regulatory non-compliance (e.g., GDPR violations), and reputational damage. The absence of availability impact means systems remain operational but compromised. Organizations with Bring Your Own Device (BYOD) policies or extensive mobile workforces using Apple devices should be especially vigilant. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers may develop exploits rapidly. Failure to patch promptly could expose European organizations to targeted attacks leveraging this vulnerability.
Mitigation Recommendations
1. Immediately deploy the security updates released by Apple: iOS 17.6, iPadOS 17.6, macOS Ventura 13.6.8, Monterey 12.7.6, Sonoma 14.6, and watchOS 10.6. 2. Restrict the use of shortcuts on corporate devices through Mobile Device Management (MDM) solutions, limiting the ability to install or run untrusted shortcuts. 3. Implement strict application and shortcut whitelisting policies to prevent unauthorized shortcuts from executing. 4. Monitor network traffic from Apple devices for unusual or unauthorized outbound connections that could indicate exploitation attempts. 5. Educate users about the risks of installing shortcuts from untrusted sources and the importance of applying updates promptly. 6. For sensitive environments, consider disabling shortcuts entirely or enforcing additional user consent mechanisms via configuration profiles. 7. Conduct regular audits of device configurations and installed shortcuts to detect any suspicious activity. 8. Integrate endpoint detection and response (EDR) tools capable of monitoring shortcut execution and network behavior on Apple devices. These measures go beyond generic patching by focusing on controlling shortcut usage and monitoring for exploitation signs.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apple
- Date Reserved
- 2024-07-10T17:11:04.689Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a3b53ff58c9332ff0749c
Added to database: 11/4/2025, 5:43:47 PM
Last enriched: 11/4/2025, 6:05:29 PM
Last updated: 12/20/2025, 5:14:38 PM
Views: 15
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-7782: CWE-862 Missing Authorization in WP JobHunt
HighCVE-2025-7733: CWE-639 Authorization Bypass Through User-Controlled Key in WP JobHunt
MediumCVE-2025-14298: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in damian-gora FiboSearch – Ajax Search for WooCommerce
MediumCVE-2025-12492: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in ultimatemember Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin
MediumCVE-2025-13619: CWE-269 Improper Privilege Management in CMSSuperHeroes Flex Store Users
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.