CVE-2024-27874

7.5 HIGH

📋 TL;DR

This vulnerability allows remote attackers to cause denial-of-service conditions on affected Apple devices through improper state management. It affects iOS and iPadOS users who haven't updated to the latest versions. The issue could disrupt device functionality without requiring user interaction.

💻 Affected Systems

Products:
  • iOS
  • iPadOS
Versions: Versions prior to iOS 18 and iPadOS 18
Operating Systems: iOS, iPadOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected versions are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device unresponsiveness requiring hard reboot, potentially disrupting critical mobile operations

🟠

Likely Case

Temporary service disruption affecting specific applications or network connectivity

🟢

If Mitigated

Minimal impact with proper network segmentation and updated devices

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Remote exploitation possible without authentication. Apple has addressed this in their latest releases.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: iOS 18, iPadOS 18

Vendor Advisory: https://support.apple.com/en-us/121250

Restart Required: Yes

Instructions:

1. Open Settings app
2. Tap General
3. Tap Software Update
4. Download and install iOS 18/iPadOS 18
5. Restart device when prompted

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to vulnerable devices from untrusted networks

Disable Unnecessary Services

all

Turn off unused network services and features on affected devices

🧯 If You Can't Patch

  • Isolate affected devices from internet-facing networks
  • Implement strict network access controls and monitor for DoS patterns

🔍 How to Verify

Check if Vulnerable:

Check iOS/iPadOS version in Settings > General > About > Software Version

Check Version:

Not applicable - check via device settings UI

Verify Fix Applied:

Verify version shows iOS 18.x or iPadOS 18.x or higher

📡 Detection & Monitoring

Log Indicators:

  • Unexpected service crashes
  • Resource exhaustion alerts
  • Connection resets

Network Indicators:

  • Unusual traffic patterns to iOS/iPadOS devices
  • Connection floods

SIEM Query:

source="ios_logs" AND (event="service_crash" OR event="resource_exhaustion")

🔗 References

📤 Share & Export