CVE-2024-27847
📋 TL;DR
This vulnerability allows an app to bypass privacy preferences on Apple devices, potentially accessing sensitive user data without proper consent. It affects iOS, iPadOS, and macOS systems running versions before the security updates. Users who haven't updated their Apple devices are vulnerable to privacy violations.
💻 Affected Systems
- iOS
- iPadOS
- macOS
📦 What is this software?
Ipados by Apple
Ipados by Apple
Macos by Apple
macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...
Learn more about Macos →Macos by Apple
macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...
Learn more about Macos →Macos by Apple
macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...
Learn more about Macos →⚠️ Risk & Real-World Impact
Worst Case
Malicious app could access sensitive user data (contacts, photos, location, etc.) without user consent, leading to privacy breaches and potential data theft.
Likely Case
Apps could access privacy-protected resources they shouldn't have permission to, violating user privacy expectations.
If Mitigated
With proper app vetting and user permission controls, impact is limited to apps that users intentionally install.
🎯 Exploit Status
Exploitation requires a malicious app to be installed on the target device. No public exploit code has been disclosed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: iOS 17.5, iPadOS 17.5, macOS Sonoma 14.5
Vendor Advisory: https://support.apple.com/en-us/HT214101
Restart Required: Yes
Instructions:
1. Go to Settings > General > Software Update. 2. Download and install iOS 17.5/iPadOS 17.5/macOS Sonoma 14.5. 3. Restart device after installation completes.
🔧 Temporary Workarounds
Restrict App Installation
allOnly install apps from trusted sources and review app permissions carefully.
Review App Permissions
allRegularly review and revoke unnecessary app permissions in privacy settings.
🧯 If You Can't Patch
- Restrict installation of new apps and only use trusted applications
- Implement mobile device management (MDM) to control app installation and permissions
🔍 How to Verify
Check if Vulnerable:
Check device version in Settings > General > About > Software Version
Check Version:
iOS/iPadOS: Settings > General > About > Software Version. macOS: Apple menu > About This Mac
Verify Fix Applied:
Verify version is iOS 17.5 or later, iPadOS 17.5 or later, or macOS Sonoma 14.5 or later
📡 Detection & Monitoring
Log Indicators:
- Unusual app behavior accessing privacy-protected resources
- Multiple permission requests from same app
Network Indicators:
- Unusual data exfiltration patterns from apps
SIEM Query:
Search for app permission changes or privacy setting modifications in system logs
🔗 References
- http://seclists.org/fulldisclosure/2024/May/10
- http://seclists.org/fulldisclosure/2024/May/12
- https://support.apple.com/en-us/HT214101
- https://support.apple.com/en-us/HT214106
- https://support.apple.com/kb/HT214100
- https://support.apple.com/kb/HT214101
- https://support.apple.com/kb/HT214105
- https://support.apple.com/kb/HT214106
- https://support.apple.com/kb/HT214107
- http://seclists.org/fulldisclosure/2024/May/10
- http://seclists.org/fulldisclosure/2024/May/12
- https://support.apple.com/en-us/HT214101
- https://support.apple.com/en-us/HT214106
- https://support.apple.com/kb/HT214100
- https://support.apple.com/kb/HT214101
- https://support.apple.com/kb/HT214105
- https://support.apple.com/kb/HT214106
- https://support.apple.com/kb/HT214107