Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-44204: A user's saved passwords may be read aloud by VoiceOver in Apple iOS and iPadOS

0
Medium
VulnerabilityCVE-2024-44204cvecve-2024-44204
Published: Thu Oct 03 2024 (10/03/2024, 23:29:52 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

A logic issue was addressed with improved validation. This issue is fixed in iOS 18.0.1 and iPadOS 18.0.1. A user's saved passwords may be read aloud by VoiceOver.

AI-Powered Analysis

AILast updated: 11/03/2025, 22:54:03 UTC

Technical Analysis

CVE-2024-44204 is a logic vulnerability in Apple’s iOS and iPadOS platforms that allows the VoiceOver accessibility feature to read aloud saved passwords without proper validation. VoiceOver is designed to assist visually impaired users by reading screen content aloud. However, due to insufficient validation logic, it can inadvertently disclose sensitive password data stored in the device’s password manager. This vulnerability affects all versions prior to iOS 18.0.1 and iPadOS 18.0.1, where Apple has implemented improved validation checks to prevent this behavior. The CVSS 3.1 score of 5.5 reflects a medium severity, with an attack vector of local access (AV:L), low attack complexity (AC:L), requiring privileges (PR:L) but no user interaction (UI:N). The impact is primarily on confidentiality (C:H), with no impact on integrity or availability. Exploitation requires an attacker to have local access to the device with some privileges, such as a logged-in user or someone with temporary physical access. No known exploits have been reported in the wild. The vulnerability poses a risk of credential exposure, which could lead to further compromise if attackers leverage the disclosed passwords for lateral movement or account takeover. The fix involves improved validation logic in the accessibility feature to prevent reading out saved passwords. Organizations should ensure devices are updated to iOS/iPadOS 18.0.1 or later to mitigate this risk.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disclosure of saved passwords on Apple mobile devices, potentially compromising user accounts and sensitive systems. The confidentiality breach could facilitate credential theft, enabling attackers to escalate privileges or access corporate resources, especially if users reuse passwords across personal and work accounts. Sectors such as finance, healthcare, government, and critical infrastructure that rely on iOS/iPadOS devices for secure communications and operations are particularly vulnerable. The requirement for local access limits remote exploitation, but insider threats or physical device theft scenarios increase risk. The vulnerability does not affect system integrity or availability, but the loss of confidentiality alone can have serious repercussions including regulatory penalties under GDPR if personal or sensitive data is exposed. Prompt patching reduces the window of exposure and helps maintain trust in device security.

Mitigation Recommendations

1. Immediately update all iOS and iPadOS devices to version 18.0.1 or later, where the vulnerability is fixed. 2. Enforce strict physical security controls to prevent unauthorized local access to devices, including screen locks and biometric protections. 3. Educate users about the risks of leaving devices unattended and the importance of applying OS updates promptly. 4. Limit the use of VoiceOver or other accessibility features on devices used in high-risk environments unless necessary. 5. Implement mobile device management (MDM) solutions to enforce update policies and monitor device compliance. 6. Encourage use of strong, unique passwords and multi-factor authentication to reduce the impact of any credential disclosure. 7. Regularly audit and review saved passwords and credentials stored on devices to minimize sensitive data exposure. 8. Consider disabling password autofill or storage on devices where security risks outweigh usability benefits.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2024-08-20T21:42:05.938Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690929a3fe7723195e0fd26b

Added to database: 11/3/2025, 10:16:03 PM

Last enriched: 11/3/2025, 10:54:03 PM

Last updated: 11/5/2025, 2:44:47 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats