Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-44180: An attacker with physical access may be able to access contacts from the lock screen in Apple iOS and iPadOS

0
Low
VulnerabilityCVE-2024-44180cvecve-2024-44180
Published: Mon Sep 16 2024 (09/16/2024, 23:23:08 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

The issue was addressed with improved checks. This issue is fixed in iOS 18 and iPadOS 18. An attacker with physical access may be able to access contacts from the lock screen.

AI-Powered Analysis

AILast updated: 11/04/2025, 16:56:10 UTC

Technical Analysis

CVE-2024-44180 is a vulnerability identified in Apple’s iOS and iPadOS platforms that allows an attacker with physical access to a device to access the contacts list directly from the lock screen. The root cause is insufficient access control checks on the lock screen interface, which previously allowed unauthorized viewing of contact information without requiring device unlock or user interaction. This vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The issue was addressed by Apple in iOS 18 and iPadOS 18 through improved access verification mechanisms that prevent contact data exposure when the device is locked. The CVSS v3.1 base score is 2.4, reflecting a low severity due to the requirement for physical access, no impact on integrity or availability, and limited confidentiality exposure. There are no known exploits in the wild, and the affected versions are unspecified but implicitly all versions prior to iOS/iPadOS 18. The attack vector is physical (AV:P), with low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and unchanged scope (S:U). The vulnerability does not allow data modification or system compromise, only read access to contacts, which may include names, phone numbers, and email addresses. This exposure could facilitate social engineering or targeted attacks if devices are lost or stolen.

Potential Impact

For European organizations, the primary impact of CVE-2024-44180 is the potential leakage of sensitive contact information from employees or executives if their Apple devices are physically accessed by unauthorized individuals. This could lead to privacy violations, targeted phishing attacks, or social engineering campaigns leveraging exposed contact data. While the vulnerability does not allow modification or broader system compromise, the confidentiality breach could undermine trust and compliance with data protection regulations such as GDPR. Organizations with mobile workforces using iPhones or iPads are particularly at risk if devices are lost, stolen, or accessed without authorization. The limited severity and requirement for physical access reduce the likelihood of widespread exploitation, but the risk remains relevant in high-security environments or where devices contain sensitive contact information. The absence of known exploits in the wild suggests that the threat is currently low but should be addressed proactively.

Mitigation Recommendations

To mitigate the risk posed by CVE-2024-44180, European organizations should prioritize updating all Apple iOS and iPadOS devices to version 18 or later, where the vulnerability is fixed. Enforcing strict physical security policies for mobile devices is critical, including the use of secure storage, device tracking, and immediate reporting of lost or stolen devices. Organizations should also consider disabling lock screen access to contacts or limiting lock screen functionality through device management policies where feasible. Implementing strong device passcodes and biometric authentication can further reduce unauthorized access risks. Regular security awareness training should emphasize the importance of physical device security and the risks of exposing contact information. Additionally, organizations should monitor for any emerging exploits or related vulnerabilities and maintain up-to-date incident response plans for device compromise scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2024-08-20T21:42:05.927Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a2dfcf0ba78a0505387f3

Added to database: 11/4/2025, 4:46:52 PM

Last enriched: 11/4/2025, 4:56:10 PM

Last updated: 12/20/2025, 9:19:29 AM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats