Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-40853: An attacker may be able to use Siri to enable Auto-Answer Calls in Apple iOS and iPadOS

0
Medium
VulnerabilityCVE-2024-40853cvecve-2024-40853
Published: Mon Oct 28 2024 (10/28/2024, 21:08:32 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

This issue was addressed by restricting options offered on a locked device. This issue is fixed in iOS 18 and iPadOS 18. An attacker may be able to use Siri to enable Auto-Answer Calls.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 23:39:11 UTC

Technical Analysis

CVE-2024-40853 is a vulnerability in Apple’s iOS and iPadOS operating systems that allows an attacker to leverage Siri voice assistant functionality to enable the Auto-Answer Calls feature on a locked device. Normally, Auto-Answer Calls is a user-configurable accessibility feature that automatically answers incoming calls after a set delay. The vulnerability arises because Siri, when invoked on a locked device, could be tricked into enabling this feature without requiring authentication or user interaction. This could allow an attacker in physical proximity to the device to cause it to automatically answer calls, potentially enabling eavesdropping or unauthorized access to conversations. The vulnerability was addressed in iOS 18 and iPadOS 18 by restricting the options Siri can offer when the device is locked, preventing unauthorized enabling of Auto-Answer Calls. The CVSS 3.1 base score is 5.9, indicating a medium severity level. The vector indicates local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and low impact on confidentiality, integrity, and availability (C:L/I:L/A:L). There are no known exploits in the wild at the time of publication. This vulnerability primarily affects Apple mobile devices running iOS and iPadOS versions prior to 18.

Potential Impact

The primary impact of this vulnerability is on user privacy and confidentiality. By enabling Auto-Answer Calls without user consent, an attacker could listen in on conversations or gather sensitive information through calls answered automatically. This could lead to unauthorized surveillance, data leakage, or exposure of confidential discussions, particularly in corporate or government environments where sensitive communications occur. The integrity and availability impacts are low but present, as unauthorized call answering could disrupt normal device usage or lead to social engineering attacks. Since exploitation requires physical proximity or voice access to the device, remote exploitation is unlikely, limiting the scope somewhat. However, given the widespread use of Apple devices globally, especially in enterprise and government sectors, the risk is significant until devices are updated. The vulnerability could be leveraged in targeted attacks against high-value individuals or organizations.

Mitigation Recommendations

To mitigate this vulnerability, affected users and organizations should promptly update all iOS and iPadOS devices to version 18 or later, where the issue is fixed by restricting Siri’s capabilities on locked devices. Until updates are applied, users should consider disabling Siri access from the lock screen to prevent unauthorized voice commands. Additionally, disabling the Auto-Answer Calls feature entirely or restricting its use to trusted environments can reduce risk. Organizations should enforce mobile device management (MDM) policies that restrict Siri usage and lock screen features on corporate devices. Physical security controls to prevent unauthorized access to devices and user training to recognize suspicious behavior can further reduce exploitation likelihood. Monitoring for unusual call answering behavior may help detect exploitation attempts. Apple’s official security advisories and updates should be followed closely for any further patches or guidance.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2024-07-10T17:11:04.710Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69ceb82ae6bfc5ba1df6e9df

Added to database: 4/2/2026, 6:40:42 PM

Last enriched: 4/2/2026, 11:39:11 PM

Last updated: 4/3/2026, 5:54:45 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses