Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-44255: A malicious app may be able to run arbitrary shortcuts without user consent in Apple iOS and iPadOS

0
High
VulnerabilityCVE-2024-44255cvecve-2024-44255
Published: Mon Oct 28 2024 (10/28/2024, 21:07:44 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

A path handling issue was addressed with improved logic. This issue is fixed in iOS 18.1 and iPadOS 18.1, macOS Sequoia 15.1, macOS Sonoma 14.7.1, macOS Ventura 13.7.1, tvOS 18.1, visionOS 2.1, watchOS 11.1. A malicious app may be able to run arbitrary shortcuts without user consent.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 00:04:14 UTC

Technical Analysis

CVE-2024-44255 is a vulnerability stemming from improper path handling in Apple’s shortcut execution logic across multiple platforms including iOS, iPadOS, macOS (Sequoia 15.1, Sonoma 14.7.1, Ventura 13.7.1), tvOS 18.1, visionOS 2.1, and watchOS 11.1. The flaw allows a malicious application to bypass user consent mechanisms and run arbitrary shortcuts, which are automated sequences of actions that can access sensitive data, control device functions, or interact with other apps. The vulnerability is classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory), indicating that the app can manipulate file paths to execute unauthorized commands. The CVSS 3.1 base score of 8.4 reflects high impact on confidentiality, integrity, and availability, with low attack complexity, no privileges required, and no user interaction needed. The vulnerability is local vector (AV:L), meaning the attacker must have local access to the device but can execute the attack without elevated privileges or user permission. Apple has fixed the issue by improving path handling logic in the affected OS versions. No public exploits or active exploitation have been reported yet, but the potential for abuse is significant given the ability to run arbitrary shortcuts silently.

Potential Impact

If exploited, this vulnerability could allow attackers to execute arbitrary shortcuts on Apple devices without user knowledge or consent, potentially leading to unauthorized access to sensitive information, manipulation or deletion of data, and disruption of device functionality. Because shortcuts can automate complex tasks including accessing contacts, location, files, and system settings, an attacker could leverage this to perform espionage, data theft, or persistent device compromise. The lack of required user interaction or privileges lowers the barrier for exploitation once local access is obtained, increasing risk in environments where devices may be physically accessible or targeted by malicious apps. This could impact individual users, enterprises, and government agencies relying on Apple ecosystems for secure communications and operations. The broad range of affected platforms increases the scope of potential impact across mobile, desktop, wearable, and emerging device categories.

Mitigation Recommendations

Organizations and users should immediately update all affected Apple devices to the patched versions: iOS 18.1, iPadOS 18.1, macOS Sequoia 15.1, macOS Sonoma 14.7.1, macOS Ventura 13.7.1, tvOS 18.1, visionOS 2.1, and watchOS 11.1. Beyond patching, restrict installation of apps to trusted sources only, such as the official Apple App Store, to reduce risk of malicious apps gaining local access. Implement mobile device management (MDM) policies to control app permissions and monitor shortcut usage. Educate users about the risks of installing untrusted apps and the importance of applying updates promptly. Employ endpoint detection and response (EDR) solutions capable of monitoring for unusual shortcut executions or unauthorized automation activities. Regularly audit device configurations and shortcut permissions to detect anomalies. For high-security environments, consider disabling shortcuts or restricting their capabilities where feasible until patches are applied.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2024-08-20T21:45:40.786Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690929a7fe7723195e0fd59a

Added to database: 11/3/2025, 10:16:07 PM

Last enriched: 4/3/2026, 12:04:14 AM

Last updated: 5/9/2026, 9:11:02 AM

Views: 110

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses