CVE-2024-44172: An app may be able to access contacts in Apple macOS
A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sequoia 15, macOS Sonoma 14.7.3, macOS Ventura 13.7.3. An app may be able to access contacts.
AI Analysis
Technical Summary
CVE-2024-44172 is a privacy-related vulnerability identified in Apple macOS operating systems, specifically impacting versions before macOS Sequoia 15, Sonoma 14.7.3, and Ventura 13.7.3. The root cause involves inadequate redaction of private data in system log entries, which could allow a locally executed application with limited privileges to access the user's contacts data without explicit consent or proper authorization. This vulnerability is categorized under CWE-863 (Incorrect Authorization), indicating that the system fails to enforce correct access controls to sensitive information. The vulnerability requires local access (AV:L) and low attack complexity (AC:L), with privileges required (PR:L) but no user interaction (UI:N). The scope is unchanged (S:U), meaning the impact is confined to the vulnerable component. The confidentiality impact is low (C:L), with no impact on integrity or availability. Apple addressed this issue by improving private data redaction in log entries, thereby preventing unauthorized apps from extracting contact information through logs. No public exploits have been reported, and the vulnerability was published in January 2025. The vulnerability primarily threatens user privacy by exposing contact information, which could be leveraged for social engineering or targeted attacks if combined with other vulnerabilities or malicious intent.
Potential Impact
The primary impact of CVE-2024-44172 is the unauthorized disclosure of user contact information on affected macOS systems. While the vulnerability does not compromise system integrity or availability, the exposure of contacts can lead to privacy violations and facilitate further targeted attacks such as phishing or social engineering. Organizations with macOS endpoints, especially those handling sensitive or confidential communications, may face increased risk of data leakage. The low CVSS score reflects the requirement for local access and privileges, limiting the attack surface to insiders or malware already running on the device. However, in environments where macOS devices are widely used, such as creative industries, education, and enterprise sectors, the vulnerability could be exploited to gather intelligence on users' contacts. This could indirectly impact organizational security posture by enabling attackers to map relationships and plan subsequent attacks. Since no known exploits exist in the wild, the immediate risk is low, but the potential for privacy breaches warrants prompt remediation.
Mitigation Recommendations
To mitigate CVE-2024-44172, organizations and users should: 1) Immediately update all macOS devices to the latest patched versions: macOS Sequoia 15, Sonoma 14.7.3, or Ventura 13.7.3 or later. 2) Enforce strict application control policies to limit installation and execution of untrusted or unnecessary apps, reducing the risk of local privilege exploitation. 3) Regularly audit app permissions and monitor logs for unusual access patterns related to contacts or private data. 4) Implement endpoint detection and response (EDR) solutions capable of detecting anomalous local activity that could indicate attempts to access sensitive data. 5) Educate users about the risks of installing unverified software and the importance of applying system updates promptly. 6) For organizations, consider deploying Mobile Device Management (MDM) solutions to enforce update policies and restrict app permissions centrally. These steps go beyond generic advice by focusing on controlling local app behavior and monitoring for privacy-related anomalies, which are critical given the local privilege requirement of this vulnerability.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, China, India, Brazil
CVE-2024-44172: An app may be able to access contacts in Apple macOS
Description
A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sequoia 15, macOS Sonoma 14.7.3, macOS Ventura 13.7.3. An app may be able to access contacts.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-44172 is a privacy-related vulnerability identified in Apple macOS operating systems, specifically impacting versions before macOS Sequoia 15, Sonoma 14.7.3, and Ventura 13.7.3. The root cause involves inadequate redaction of private data in system log entries, which could allow a locally executed application with limited privileges to access the user's contacts data without explicit consent or proper authorization. This vulnerability is categorized under CWE-863 (Incorrect Authorization), indicating that the system fails to enforce correct access controls to sensitive information. The vulnerability requires local access (AV:L) and low attack complexity (AC:L), with privileges required (PR:L) but no user interaction (UI:N). The scope is unchanged (S:U), meaning the impact is confined to the vulnerable component. The confidentiality impact is low (C:L), with no impact on integrity or availability. Apple addressed this issue by improving private data redaction in log entries, thereby preventing unauthorized apps from extracting contact information through logs. No public exploits have been reported, and the vulnerability was published in January 2025. The vulnerability primarily threatens user privacy by exposing contact information, which could be leveraged for social engineering or targeted attacks if combined with other vulnerabilities or malicious intent.
Potential Impact
The primary impact of CVE-2024-44172 is the unauthorized disclosure of user contact information on affected macOS systems. While the vulnerability does not compromise system integrity or availability, the exposure of contacts can lead to privacy violations and facilitate further targeted attacks such as phishing or social engineering. Organizations with macOS endpoints, especially those handling sensitive or confidential communications, may face increased risk of data leakage. The low CVSS score reflects the requirement for local access and privileges, limiting the attack surface to insiders or malware already running on the device. However, in environments where macOS devices are widely used, such as creative industries, education, and enterprise sectors, the vulnerability could be exploited to gather intelligence on users' contacts. This could indirectly impact organizational security posture by enabling attackers to map relationships and plan subsequent attacks. Since no known exploits exist in the wild, the immediate risk is low, but the potential for privacy breaches warrants prompt remediation.
Mitigation Recommendations
To mitigate CVE-2024-44172, organizations and users should: 1) Immediately update all macOS devices to the latest patched versions: macOS Sequoia 15, Sonoma 14.7.3, or Ventura 13.7.3 or later. 2) Enforce strict application control policies to limit installation and execution of untrusted or unnecessary apps, reducing the risk of local privilege exploitation. 3) Regularly audit app permissions and monitor logs for unusual access patterns related to contacts or private data. 4) Implement endpoint detection and response (EDR) solutions capable of detecting anomalous local activity that could indicate attempts to access sensitive data. 5) Educate users about the risks of installing unverified software and the importance of applying system updates promptly. 6) For organizations, consider deploying Mobile Device Management (MDM) solutions to enforce update policies and restrict app permissions centrally. These steps go beyond generic advice by focusing on controlling local app behavior and monitoring for privacy-related anomalies, which are critical given the local privilege requirement of this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apple
- Date Reserved
- 2024-08-20T21:42:05.926Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6909214efe7723195e0545a1
Added to database: 11/3/2025, 9:40:30 PM
Last enriched: 4/2/2026, 11:51:15 PM
Last updated: 5/9/2026, 2:48:44 PM
Views: 96
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.