CVE-2024-23203
📋 TL;DR
This vulnerability allows malicious shortcuts in macOS, iOS, and iPadOS to access sensitive user data without proper permission prompts. It affects users who install or run untrusted shortcuts on their Apple devices. The issue bypasses normal security checks that should require user consent for data access.
💻 Affected Systems
- macOS
- iOS
- iPadOS
📦 What is this software?
Ipados by Apple
Macos by Apple
macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...
Learn more about Macos →⚠️ Risk & Real-World Impact
Worst Case
An attacker could create a shortcut that silently accesses sensitive data like contacts, photos, location, or credentials, potentially leading to data theft, privacy violations, or further attacks.
Likely Case
Malicious shortcuts distributed through social engineering or compromised apps could access limited sensitive data without user awareness, though full system compromise is unlikely.
If Mitigated
With proper controls, only trusted shortcuts would run, limiting exposure to data that shortcuts normally have permission to access.
🎯 Exploit Status
Exploitation requires social engineering to get users to install malicious shortcuts. No public exploit code identified in references.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: macOS Sonoma 14.3, iOS 17.3, iPadOS 17.3
Vendor Advisory: https://support.apple.com/en-us/HT214059
Restart Required: Yes
Instructions:
1. Open Settings/System Preferences. 2. Go to General > Software Update. 3. Install macOS Sonoma 14.3, iOS 17.3, or iPadOS 17.3. 4. Restart device after installation.
🔧 Temporary Workarounds
Disable Untrusted Shortcuts
allPrevent installation of shortcuts from untrusted sources
Settings > Shortcuts > Allow Untrusted Shortcuts > OFF
Review Shortcut Permissions
allManually review and restrict permissions for existing shortcuts
Shortcuts app > Select shortcut > Info > Review permissions
🧯 If You Can't Patch
- Only install shortcuts from trusted sources and developers
- Regularly review and audit installed shortcuts for suspicious behavior
🔍 How to Verify
Check if Vulnerable:
Check if device is running macOS <14.3, iOS <17.3, or iPadOS <17.3
Check Version:
macOS: sw_vers -productVersion, iOS/iPadOS: Settings > General > About > Version
Verify Fix Applied:
Confirm device is updated to macOS 14.3, iOS 17.3, or iPadOS 17.3 or later
📡 Detection & Monitoring
Log Indicators:
- Shortcuts app accessing sensitive data without user prompts
- Unusual shortcut execution patterns
Network Indicators:
- Shortcuts making unexpected network connections to exfiltrate data
SIEM Query:
process:shortcuts AND (event:data_access OR event:permission_bypass)
🔗 References
- http://seclists.org/fulldisclosure/2024/Jan/33
- http://seclists.org/fulldisclosure/2024/Jan/36
- http://seclists.org/fulldisclosure/2024/Mar/22
- https://support.apple.com/en-us/HT214059
- https://support.apple.com/en-us/HT214061
- https://support.apple.com/kb/HT214082
- https://support.apple.com/kb/HT214085
- http://seclists.org/fulldisclosure/2024/Jan/33
- http://seclists.org/fulldisclosure/2024/Jan/36
- http://seclists.org/fulldisclosure/2024/Mar/22
- https://support.apple.com/en-us/HT214059
- https://support.apple.com/en-us/HT214061
- https://support.apple.com/kb/HT214061
- https://support.apple.com/kb/HT214082
- https://support.apple.com/kb/HT214085