Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-40832: An app may be able to view a contact's phone number in system logs in Apple macOS

0
Low
VulnerabilityCVE-2024-40832cvecve-2024-40832
Published: Mon Jul 29 2024 (07/29/2024, 22:17:10 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: macOS

Description

The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6. An app may be able to view a contact's phone number in system logs.

AI-Powered Analysis

AILast updated: 11/04/2025, 22:21:41 UTC

Technical Analysis

CVE-2024-40832 is a vulnerability identified in Apple macOS that allows an application with limited privileges to view a contact's phone number by accessing system logs. The root cause is insufficient validation and access control mechanisms around logging sensitive contact information, which led to leakage of personally identifiable information (PII) through logs accessible to apps. This vulnerability is classified under CWE-922, which relates to improper restriction of operations within the bounds of a memory buffer or resource, here manifesting as improper access control to sensitive log data. The vulnerability affects unspecified versions of macOS prior to the patch release. Exploitation requires local access with limited privileges but does not require user interaction, making it a potential privacy concern but with limited attack surface. The vulnerability impacts confidentiality only, with no effect on integrity or availability of the system. Apple resolved this issue in macOS Sonoma 14.6 by implementing improved checks to prevent unauthorized access to contact information in system logs. No public exploits have been reported, and the CVSS v3.1 base score is 3.3, reflecting low severity due to limited impact and exploitation complexity.

Potential Impact

For European organizations, the primary impact of CVE-2024-40832 is the potential unauthorized disclosure of contact phone numbers through system logs accessible by local applications. This could lead to privacy violations and could be leveraged in targeted social engineering or phishing attacks if an attacker gains local access. While the vulnerability does not allow remote exploitation or system compromise, it poses a risk to confidentiality of sensitive personal data, which is subject to strict regulation under GDPR. Organizations handling sensitive customer or employee contact information on macOS devices may face compliance risks if such data is exposed. The impact on operational integrity and availability is negligible, but the reputational and legal consequences of data leakage could be significant, especially for sectors like finance, healthcare, and government agencies in Europe. The lack of known exploits reduces immediate risk, but the vulnerability should be addressed promptly to maintain data privacy standards.

Mitigation Recommendations

European organizations should prioritize upgrading all macOS systems to version Sonoma 14.6 or later, where the vulnerability is patched. Additionally, organizations should audit and restrict app permissions rigorously, ensuring that only trusted applications have access to system logs or contact data. Employing endpoint security solutions that monitor and control application behavior can help detect unauthorized access attempts to sensitive logs. Regularly reviewing system logs for unusual access patterns can also help identify potential exploitation attempts. Organizations should enforce strict local user access controls to minimize the risk of unprivileged users or malicious insiders exploiting this vulnerability. Finally, educating users about the risks of installing untrusted applications and maintaining a robust patch management policy will reduce exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2024-07-10T17:11:04.700Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a3b57ff58c9332ff079eb

Added to database: 11/4/2025, 5:43:51 PM

Last enriched: 11/4/2025, 10:21:41 PM

Last updated: 11/5/2025, 1:05:57 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats