CVE-2024-40774

7.1 HIGH

📋 TL;DR

This vulnerability allows malicious applications to bypass macOS and iOS privacy preferences by exploiting a downgrade issue in code-signing restrictions. It affects users running unpatched Apple operating systems, potentially exposing sensitive user data to unauthorized access.

💻 Affected Systems

Products:
  • macOS
  • iOS
  • iPadOS
  • watchOS
  • tvOS
Versions: Versions prior to macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6, iPadOS 17.6, watchOS 10.6, tvOS 17.6, macOS Sonoma 14.6
Operating Systems: macOS, iOS, iPadOS, watchOS, tvOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected versions are vulnerable. The vulnerability requires a malicious app to be installed.

📦 What is this software?

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

Macos by Apple

macOS is Apple's desktop and laptop operating system powering Mac computers used by millions of professionals, developers, creative professionals, and enterprise users worldwide. Built on a Unix foundation with the Darwin kernel and modern Cocoa frameworks, macOS delivers a seamless ecosystem integr...

Learn more about Macos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious app gains unauthorized access to protected user data (contacts, photos, location, microphone, camera) without user consent, leading to privacy violations and potential data exfiltration.

🟠

Likely Case

Malicious app bypasses privacy prompts to access sensitive data the user hasn't authorized, compromising user privacy.

🟢

If Mitigated

With proper patching, the vulnerability is eliminated; with app vetting and user caution, risk is significantly reduced.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires a malicious app to be installed on the device, which typically requires user interaction or social engineering.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6, iPadOS 17.6, watchOS 10.6, tvOS 17.6, macOS Sonoma 14.6

Vendor Advisory: https://support.apple.com/en-us/HT214108

Restart Required: Yes

Instructions:

1. Open System Settings (macOS) or Settings (iOS/iPadOS). 2. Go to General > Software Update. 3. Install the available update. 4. Restart the device when prompted.

🔧 Temporary Workarounds

Restrict App Installation Sources

all

Only allow app installations from the App Store to reduce the risk of malicious apps.

For macOS: System Settings > Privacy & Security > Allow apps downloaded from: App Store
For iOS/iPadOS: Settings > General > Device Management > Enable restrictions if available

🧯 If You Can't Patch

  • Only install apps from trusted sources like the official App Store.
  • Review and restrict app permissions in system privacy settings regularly.

🔍 How to Verify

Check if Vulnerable:

Check the current OS version against the patched versions listed in the fix.

Check Version:

For macOS: sw_vers, For iOS/iPadOS: Settings > General > About > Version

Verify Fix Applied:

Verify the OS version matches or exceeds the patched version after update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual app behavior accessing protected resources without user prompts in system logs
  • Privacy permission changes not initiated by user

Network Indicators:

  • Unexpected network traffic from apps that shouldn't have network access

SIEM Query:

source="apple_system_logs" AND (event="privacy_violation" OR app_access="unauthorized")

🔗 References

📤 Share & Export