Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-40852: An attacker may be able to see recent photos without authentication in Assistive Access in Apple iOS and iPadOS

0
High
VulnerabilityCVE-2024-40852cvecve-2024-40852
Published: Mon Sep 16 2024 (09/16/2024, 23:23:22 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

This issue was addressed by restricting options offered on a locked device. This issue is fixed in iOS 18 and iPadOS 18. An attacker may be able to see recent photos without authentication in Assistive Access.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 23:39:01 UTC

Technical Analysis

CVE-2024-40852 is a vulnerability identified in Apple’s iOS and iPadOS operating systems, specifically impacting the Assistive Access feature. Assistive Access is designed to help users with disabilities by providing simplified access to device functions. The vulnerability allows an attacker to bypass authentication on a locked device and view recent photos without any user interaction or privileges. This occurs because the system fails to properly restrict the options available through Assistive Access when the device is locked, effectively exposing sensitive user data. The vulnerability is classified under CWE-862 (Missing Authorization), indicating a failure to enforce proper access controls. Apple addressed this issue in iOS 18 and iPadOS 18 by restricting the options accessible on locked devices, thereby preventing unauthorized photo access. The CVSS 3.1 base score is 7.5, with vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, indicating network attack vector, low attack complexity, no privileges or user interaction required, unchanged scope, and high confidentiality impact. No integrity or availability impacts are noted. No known exploits have been reported in the wild as of the publication date. This vulnerability primarily threatens user privacy by exposing recent photos, which could contain sensitive personal or corporate information. The ease of exploitation combined with the lack of authentication requirements makes this a significant privacy risk for affected users.

Potential Impact

The primary impact of CVE-2024-40852 is a breach of confidentiality, allowing attackers to access recent photos on locked iOS and iPadOS devices without authentication. This can lead to significant privacy violations, exposing personal, corporate, or sensitive images to unauthorized parties. For organizations, this could result in leakage of proprietary information or personally identifiable information (PII), potentially leading to reputational damage, regulatory penalties, and loss of customer trust. Since the vulnerability requires no user interaction or privileges, it can be exploited remotely if an attacker gains network access or physical proximity to the device. The lack of impact on integrity and availability means the device’s functionality remains unaffected, but the confidentiality breach alone is critical. The vulnerability could be leveraged in targeted attacks against high-value individuals or organizations, especially those relying heavily on Apple devices. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers may develop exploits following public disclosure. Overall, the vulnerability poses a high risk to privacy and data protection for users worldwide.

Mitigation Recommendations

1. Immediate update to iOS 18 and iPadOS 18 or later versions where the vulnerability is patched. 2. Disable Assistive Access on devices where it is not required, reducing the attack surface. 3. Implement strict physical security controls to prevent unauthorized access to locked devices. 4. Educate users about the risks of leaving devices unattended and encourage use of strong passcodes and biometric locks. 5. Monitor device logs and network activity for unusual access patterns that may indicate exploitation attempts. 6. For organizations, enforce mobile device management (MDM) policies that mandate timely OS updates and restrict use of accessibility features if not necessary. 7. Consider additional encryption or containerization solutions for sensitive photos and data to mitigate exposure even if accessed. 8. Stay informed about any emerging exploits or patches related to this vulnerability through trusted threat intelligence sources.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2024-07-10T17:11:04.710Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a2df4f0ba78a050537622

Added to database: 11/4/2025, 4:46:44 PM

Last enriched: 4/2/2026, 11:39:01 PM

Last updated: 5/9/2026, 9:08:38 AM

Views: 107

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses