Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-40839: An attacker with physical access to an iOS device may be able to view notification contents from the Lock Screen in Apple iOS and iPadOS

0
Low
VulnerabilityCVE-2024-40839cvecve-2024-40839
Published: Wed Jan 15 2025 (01/15/2025, 19:35:59 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

This issue was addressed through improved state management. This issue is fixed in iOS 17.5 and iPadOS 17.5. An attacker with physical access to an iOS device may be able to view notification contents from the Lock Screen.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 23:36:26 UTC

Technical Analysis

CVE-2024-40839 is a vulnerability identified in Apple’s iOS and iPadOS platforms that allows an attacker with physical access to a device to view the contents of notifications directly from the Lock Screen. This issue stems from improper state management within the operating system, which fails to adequately restrict access to notification data when the device is locked. As a result, sensitive information displayed in notifications—such as messages, emails, or app alerts—can be exposed without requiring device unlock or user authentication. The vulnerability affects all versions prior to iOS and iPadOS 17.5, where Apple addressed the issue by improving state management controls. The CVSS v3.1 score is 2.4, reflecting a low severity primarily due to the requirement for physical access and the limited scope of impact (confidentiality only). There is no impact on integrity or availability, and no user interaction is needed beyond physical possession of the device. No known exploits have been reported in the wild, indicating limited active exploitation. The vulnerability is classified under CWE-862 (Missing Authorization), highlighting the failure to properly enforce access control on notification content. This flaw could be exploited by attackers who gain temporary physical access to a locked device, such as in theft or opportunistic scenarios, to glean sensitive information from notifications without unlocking the device.

Potential Impact

The primary impact of CVE-2024-40839 is the potential compromise of confidentiality for users of affected Apple devices. Attackers with physical access can view sensitive notification content, which may include personal messages, authentication codes, or other private information, potentially leading to privacy breaches or aiding further social engineering attacks. However, the vulnerability does not affect device integrity or availability, nor does it allow remote exploitation, limiting its overall risk profile. Organizations relying on iOS and iPadOS devices for sensitive communications may face increased risk of data leakage if devices are lost or stolen and not promptly updated. The exposure of notification content could also undermine user trust and compliance with privacy regulations in sectors such as healthcare, finance, and government. Despite the low severity rating, the vulnerability underscores the importance of securing physical access to devices and timely patching to prevent unauthorized data disclosure.

Mitigation Recommendations

To mitigate CVE-2024-40839, organizations and users should immediately update all affected Apple devices to iOS and iPadOS version 17.5 or later, where the vulnerability has been fixed through improved state management. Additionally, users should configure their notification settings to limit sensitive content visibility on the Lock Screen by disabling 'Show Previews' or setting it to 'When Unlocked' in the device’s notification settings. Employing strong device passcodes and enabling biometric authentication can further reduce the risk of unauthorized access. Organizations should enforce mobile device management (MDM) policies that restrict notification previews on locked devices, especially for corporate-owned devices. Physical security controls should be enhanced to prevent unauthorized physical access to devices. Regular user training on the risks of physical device access and the importance of software updates will also help reduce exposure. Monitoring for lost or stolen devices and enabling remote wipe capabilities can mitigate potential data exposure from physical theft.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2024-07-10T17:11:04.706Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69ceb82ae6bfc5ba1df6e9dc

Added to database: 4/2/2026, 6:40:42 PM

Last enriched: 4/2/2026, 11:36:26 PM

Last updated: 4/3/2026, 5:50:56 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses