Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-40830: An app may be able to enumerate a user's installed apps in Apple iOS and iPadOS

0
Low
VulnerabilityCVE-2024-40830cvecve-2024-40830
Published: Mon Sep 16 2024 (09/16/2024, 23:22:07 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

This issue was addressed with improved data protection. This issue is fixed in iOS 18 and iPadOS 18. An app may be able to enumerate a user's installed apps.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 23:34:41 UTC

Technical Analysis

CVE-2024-40830 is a privacy-related vulnerability affecting Apple’s iOS and iPadOS platforms prior to version 18. The flaw allows an application, with limited privileges and without requiring user interaction, to enumerate the list of installed applications on a device. This enumeration capability can reveal sensitive information about a user's app usage and preferences, potentially aiding attackers in profiling users or crafting targeted phishing or social engineering attacks. The vulnerability stems from insufficient data protection controls around app installation metadata, which Apple has rectified by enhancing data protection in iOS 18 and iPadOS 18. The vulnerability requires local access and some privilege level (likely an installed app with standard permissions), but does not allow modification or disruption of system functions. The CVSS 3.1 score of 3.3 reflects a low impact primarily on confidentiality, with no impact on integrity or availability, and no user interaction required. No public exploits have been reported, and the issue was reserved and published in mid-2024. This vulnerability highlights the importance of strict data access controls on mobile platforms to protect user privacy.

Potential Impact

The primary impact of CVE-2024-40830 is on user privacy and confidentiality. By allowing an app to enumerate installed applications, attackers can gain insights into a user's behavior, interests, and potentially sensitive app usage patterns. This information could be used to tailor phishing attacks, identify targets for further exploitation, or infer sensitive personal or corporate information. Although the vulnerability does not affect system integrity or availability, the leakage of installed app data can undermine user trust and privacy. For organizations, especially those with employees using iOS/iPadOS devices, this could increase the risk of targeted social engineering attacks or corporate espionage. However, the low CVSS score and requirement for local privileges limit the scope of impact, making widespread exploitation less likely without additional attack vectors.

Mitigation Recommendations

To mitigate CVE-2024-40830, organizations and users should promptly update all affected devices to iOS 18 or iPadOS 18, where the vulnerability has been addressed through improved data protection. Beyond patching, organizations should enforce strict app installation policies, limiting the installation of untrusted or unnecessary applications to reduce the attack surface. Employ Mobile Device Management (MDM) solutions to monitor and control app permissions and detect anomalous app behaviors. Additionally, educate users about the risks of installing apps from unverified sources and the importance of applying system updates promptly. Developers should follow the principle of least privilege and avoid requesting unnecessary permissions that could expose sensitive data. Continuous monitoring for unusual app behavior or data access patterns can help detect attempts to exploit similar privacy-related vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2024-07-10T17:11:04.699Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a2df0f0ba78a050537421

Added to database: 11/4/2025, 4:46:40 PM

Last enriched: 4/2/2026, 11:34:41 PM

Last updated: 5/9/2026, 8:48:39 AM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses